2025/04/30 10:09:36 Requesting https://server4:443/mdvwsequir. 2025/04/30 10:09:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:36 Increased send buffer size to 14336 kiB 2025/04/30 10:09:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:36 Created qlog file: /logs/qlog/1eb882ccbdb2349a44552a239839.sqlog 2025/04/30 10:09:36 client Starting new connection to server4 ([::]:34411 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1eb882ccbdb2349a44552a239839, version v1 2025/04/30 10:09:36 Adding connection ID (empty). 2025/04/30 10:09:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:36 client -> Sending packet 0 (1280 bytes) for connection 1eb882ccbdb2349a44552a239839, Initial 2025/04/30 10:09:36 client Long Header{Type: Initial, DestConnectionID: 1eb882ccbdb2349a44552a239839, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:09:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:37 client -> Sending packet 1 (1280 bytes) for connection 1eb882ccbdb2349a44552a239839, Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 1eb882ccbdb2349a44552a239839, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:09:37 client -> Sending packet 2 (1280 bytes) for connection 1eb882ccbdb2349a44552a239839, Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 1eb882ccbdb2349a44552a239839, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:09:37 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:37 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:37 client Received first packet. Switching destination connection ID to: 00000000000010034902b68f6ccc05fa7ac63470 2025/04/30 10:09:37 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:37 client newly acked packets (1): [2] 2025/04/30 10:09:37 client updated RTT: 40.438335ms (σ: 20.219167ms) 2025/04/30 10:09:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:37 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1eb882ccbdb2349a44552a239839, InitialSourceConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xcd54fd7ff07683ee7dd40c8637253a1f} 2025/04/30 10:09:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1eb882ccbdb2349a44552a239839 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:37 client Dropping Initial keys. 2025/04/30 10:09:37 client -> Sending packet 1 (52 bytes) for connection 1eb882ccbdb2349a44552a239839, Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:37 client -> Sending packet 0 (58 bytes) for connection 1eb882ccbdb2349a44552a239839, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:37 client Short Header{DestConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:37 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:37 client Peer doesn't await address validation any longer. 2025/04/30 10:09:37 client newly acked packets (1): [0] 2025/04/30 10:09:37 client updated RTT: 39.632ms (σ: 16.775ms) 2025/04/30 10:09:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:37 client Canceling loss detection timer. 2025/04/30 10:09:37 client Dropping Handshake keys. 2025/04/30 10:09:37 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:37 client -> Sending packet 1 (44 bytes) for connection 1eb882ccbdb2349a44552a239839, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:37 client Short Header{DestConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 138.847µs} 2025/04/30 10:09:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:37 client -> Sending packet 2 (42 bytes) for connection 1eb882ccbdb2349a44552a239839, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:37 client Short Header{DestConnectionID: 00000000000010034902b68f6ccc05fa7ac63470, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:37 client Connection 1eb882ccbdb2349a44552a239839 closed. 2025/04/30 10:09:37 Requesting https://server4:443/czqglfpihk. 2025/04/30 10:09:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:37 Increased send buffer size to 14336 kiB 2025/04/30 10:09:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:37 Created qlog file: /logs/qlog/2831adc3f815d8645b62.sqlog 2025/04/30 10:09:37 client Starting new connection to server4 ([::]:52688 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2831adc3f815d8645b62, version v1 2025/04/30 10:09:37 Adding connection ID (empty). 2025/04/30 10:09:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:37 client -> Sending packet 0 (1280 bytes) for connection 2831adc3f815d8645b62, Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 2831adc3f815d8645b62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:37 client -> Sending packet 1 (1280 bytes) for connection 2831adc3f815d8645b62, Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 2831adc3f815d8645b62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:37 client -> Sending packet 2 (1280 bytes) for connection 2831adc3f815d8645b62, Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 2831adc3f815d8645b62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:37 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:37 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003066ad304c6cdfa475405664b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:37 client Received first packet. Switching destination connection ID to: 0000000000001003066ad304c6cdfa475405664b 2025/04/30 10:09:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:37 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:09:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2831adc3f815d8645b62, InitialSourceConnectionID: 0000000000001003066ad304c6cdfa475405664b, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x92547640ddfe9d3570ac80c0cedcd9d8} 2025/04/30 10:09:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2831adc3f815d8645b62 2025/04/30 10:09:37 client Long Header{Type: Initial, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:37 client Dropping Initial keys. 2025/04/30 10:09:37 client -> Sending packet 1 (52 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:37 client -> Sending packet 0 (58 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:37 client Short Header{DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:37 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:37 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:37 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:37 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:09:37 client -> Sending packet 2 (52 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:37 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:37 client -> Sending packet 3 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:37 client -> Sending packet 4 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:37 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:09:38 client -> Sending packet 5 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:38 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:38 client -> Sending packet 6 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:38 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:38 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:38 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:38 client <- &wire.PingFrame{} 2025/04/30 10:09:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:38 client -> Sending packet 1 (44 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:38 client Short Header{DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:38 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 104.246µs} 2025/04/30 10:09:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:09:38 client -> Sending packet 7 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:38 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:38 client -> Sending packet 8 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:38 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:39 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 10:09:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 10:09:40 client -> Sending packet 9 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:40 client -> Sending packet 10 (86 bytes) for connection 2831adc3f815d8645b62, Handshake 2025/04/30 10:09:40 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:40 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:40 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:40 client <- &wire.PingFrame{} 2025/04/30 10:09:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:40 client -> Sending packet 2 (46 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 137.956µs} 2025/04/30 10:09:40 client <- Reading packet 8 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:40 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:40 client <- &wire.PingFrame{} 2025/04/30 10:09:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:40 client -> Sending packet 3 (48 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 81.885µs} 2025/04/30 10:09:40 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:40 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:40 client <- &wire.PingFrame{} 2025/04/30 10:09:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:40 client -> Sending packet 4 (50 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 70.974µs} 2025/04/30 10:09:40 client <- Reading packet 13 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:40 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:40 client <- &wire.PingFrame{} 2025/04/30 10:09:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:40 client <- Reading packet 14 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:40 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:40 client <- &wire.PingFrame{} 2025/04/30 10:09:40 client -> Sending packet 5 (52 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003066ad304c6cdfa475405664b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 3, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 133.311µs} 2025/04/30 10:09:40 client <- Reading packet 15 (1180 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:40 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:40 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:40 client Peer doesn't await address validation any longer. 2025/04/30 10:09:40 client newly acked packets (1): [0] 2025/04/30 10:09:40 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:40 client Canceling loss detection timer. 2025/04/30 10:09:40 client Dropping Handshake keys. 2025/04/30 10:09:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003a01d3dcb47e40d10fbe9e139, StatelessResetToken: 0xcf8a5808b7542a6b42725fd43ddae8df} 2025/04/30 10:09:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003da77be1651f1815ffdfb1141, StatelessResetToken: 0xa8171aca42d66a994bc7a4d4751b19c4} 2025/04/30 10:09:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010034739d3c686f24a3f1dc676b7, StatelessResetToken: 0xa3f5094f0cbe06098257dbeaa560e5a0} 2025/04/30 10:09:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:40 client -> Sending packet 6 (1366 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003a01d3dcb47e40d10fbe9e139, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.PingFrame{} 2025/04/30 10:09:40 client -> Sending packet 7 (54 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003a01d3dcb47e40d10fbe9e139, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 3, AckRanges: {{Largest: 15, Smallest: 13}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 349.758µs} 2025/04/30 10:09:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:40 client -> Sending packet 8 (42 bytes) for connection 2831adc3f815d8645b62, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:40 client Short Header{DestConnectionID: 0000000000001003a01d3dcb47e40d10fbe9e139, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:40 client Connection 2831adc3f815d8645b62 closed. 2025/04/30 10:09:40 Requesting https://server4:443/cvwhccdwps. 2025/04/30 10:09:40 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:40 Increased send buffer size to 14336 kiB 2025/04/30 10:09:40 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:40 Created qlog file: /logs/qlog/d5f6408a802189d3b13fde9fb22298b0cb127f.sqlog 2025/04/30 10:09:40 client Starting new connection to server4 ([::]:39022 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d5f6408a802189d3b13fde9fb22298b0cb127f, version v1 2025/04/30 10:09:40 Adding connection ID (empty). 2025/04/30 10:09:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:40 client -> Sending packet 0 (1280 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f, Initial 2025/04/30 10:09:40 client Long Header{Type: Initial, DestConnectionID: d5f6408a802189d3b13fde9fb22298b0cb127f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:41 client -> Sending packet 1 (1280 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: d5f6408a802189d3b13fde9fb22298b0cb127f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:41 client -> Sending packet 2 (1280 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: d5f6408a802189d3b13fde9fb22298b0cb127f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:09:41 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:09:41 client Received first packet. Switching destination connection ID to: 0000000000001003710cafd73bd1f9bbc582e783 2025/04/30 10:09:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:41 client newly acked packets (1): [2] 2025/04/30 10:09:41 client updated RTT: 33.849448ms (σ: 16.924724ms) 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:09:41 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 10:09:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d5f6408a802189d3b13fde9fb22298b0cb127f, InitialSourceConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x98789ef2bf246a1bc923592b7cffba96} 2025/04/30 10:09:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:41 client Dropping Initial keys. 2025/04/30 10:09:41 client -> Sending packet 1 (110 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f, Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003710cafd73bd1f9bbc582e783, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:41 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:41 client Dropping Handshake keys. 2025/04/30 10:09:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003839b27a861b4765795c20311, StatelessResetToken: 0x9995e5510ad9e1277cbc87bcc8465966} 2025/04/30 10:09:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003bf664c84c4d9c2bcfd1b4622, StatelessResetToken: 0xa4c6e2d99ed76449538653d5df0b65e2} 2025/04/30 10:09:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010035a6a09359490f34de46a2c37, StatelessResetToken: 0x1d9bb2a69094deb4586bf321d47f1f1f} 2025/04/30 10:09:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:41 client -> Sending packet 1 (46 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003839b27a861b4765795c20311, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.326µs} 2025/04/30 10:09:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:41 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client newly acked packets (1): [0] 2025/04/30 10:09:41 client updated RTT: 33.853ms (σ: 12.702ms) 2025/04/30 10:09:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:41 client -> Sending packet 2 (42 bytes) for connection d5f6408a802189d3b13fde9fb22298b0cb127f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003839b27a861b4765795c20311, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:41 client Connection d5f6408a802189d3b13fde9fb22298b0cb127f closed. 2025/04/30 10:09:41 Requesting https://server4:443/cldcszmida. 2025/04/30 10:09:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:41 Increased send buffer size to 14336 kiB 2025/04/30 10:09:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:41 Created qlog file: /logs/qlog/c0326a557d0d6c05b194f82ef45413.sqlog 2025/04/30 10:09:41 client Starting new connection to server4 ([::]:47411 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c0326a557d0d6c05b194f82ef45413, version v1 2025/04/30 10:09:41 Adding connection ID (empty). 2025/04/30 10:09:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:41 client -> Sending packet 0 (1280 bytes) for connection c0326a557d0d6c05b194f82ef45413, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: c0326a557d0d6c05b194f82ef45413, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:41 client -> Sending packet 1 (1280 bytes) for connection c0326a557d0d6c05b194f82ef45413, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: c0326a557d0d6c05b194f82ef45413, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:41 client -> Sending packet 2 (1280 bytes) for connection c0326a557d0d6c05b194f82ef45413, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: c0326a557d0d6c05b194f82ef45413, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:41 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d830d9d7278f237930afa776, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:41 client Received first packet. Switching destination connection ID to: 0000000000001003d830d9d7278f237930afa776 2025/04/30 10:09:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:41 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d830d9d7278f237930afa776, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c0326a557d0d6c05b194f82ef45413, InitialSourceConnectionID: 0000000000001003d830d9d7278f237930afa776, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x0ba98bc586ad1159ef983cfbcd9c1594} 2025/04/30 10:09:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c0326a557d0d6c05b194f82ef45413 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 0000000000001003d830d9d7278f237930afa776, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d830d9d7278f237930afa776, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:41 client Dropping Initial keys. 2025/04/30 10:09:41 client -> Sending packet 1 (52 bytes) for connection c0326a557d0d6c05b194f82ef45413, Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d830d9d7278f237930afa776, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client -> Sending packet 0 (58 bytes) for connection c0326a557d0d6c05b194f82ef45413, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003d830d9d7278f237930afa776, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:41 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:41 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d830d9d7278f237930afa776, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:41 client -> Sending packet 2 (52 bytes) for connection c0326a557d0d6c05b194f82ef45413, Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d830d9d7278f237930afa776, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client Peer doesn't await address validation any longer. 2025/04/30 10:09:41 client newly acked packets (1): [0] 2025/04/30 10:09:41 client updated RTT: 33.718016ms (σ: 16.859008ms) 2025/04/30 10:09:41 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:41 client Canceling loss detection timer. 2025/04/30 10:09:41 client Dropping Handshake keys. 2025/04/30 10:09:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:41 client -> Sending packet 1 (44 bytes) for connection c0326a557d0d6c05b194f82ef45413, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003d830d9d7278f237930afa776, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 106.12µs} 2025/04/30 10:09:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:41 client -> Sending packet 2 (42 bytes) for connection c0326a557d0d6c05b194f82ef45413, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003d830d9d7278f237930afa776, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:41 client Connection c0326a557d0d6c05b194f82ef45413 closed. 2025/04/30 10:09:41 Requesting https://server4:443/wszaepvnfr. 2025/04/30 10:09:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:41 Increased send buffer size to 14336 kiB 2025/04/30 10:09:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:41 Created qlog file: /logs/qlog/738b6654a6a454c318c858ef.sqlog 2025/04/30 10:09:41 client Starting new connection to server4 ([::]:43408 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 738b6654a6a454c318c858ef, version v1 2025/04/30 10:09:41 Adding connection ID (empty). 2025/04/30 10:09:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:41 client -> Sending packet 0 (1280 bytes) for connection 738b6654a6a454c318c858ef, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 738b6654a6a454c318c858ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:41 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c4e57444da780b698e596aec, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:41 client Received first packet. Switching destination connection ID to: 0000000000001003c4e57444da780b698e596aec 2025/04/30 10:09:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client newly acked packets (1): [0] 2025/04/30 10:09:41 client updated RTT: 33.930434ms (σ: 16.965217ms) 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:41 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c4e57444da780b698e596aec, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 738b6654a6a454c318c858ef, InitialSourceConnectionID: 0000000000001003c4e57444da780b698e596aec, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6e5e3e503e6233bd0157c0b9eb7e9c4a} 2025/04/30 10:09:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 738b6654a6a454c318c858ef 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 0000000000001003c4e57444da780b698e596aec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c4e57444da780b698e596aec, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:41 client Dropping Initial keys. 2025/04/30 10:09:41 client -> Sending packet 1 (110 bytes) for connection 738b6654a6a454c318c858ef, Handshake 2025/04/30 10:09:41 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c4e57444da780b698e596aec, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003c4e57444da780b698e596aec, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:41 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:41 client Peer doesn't await address validation any longer. 2025/04/30 10:09:41 client newly acked packets (1): [0] 2025/04/30 10:09:41 client updated RTT: 33.942ms (σ: 12.748ms) 2025/04/30 10:09:41 client Canceling loss detection timer. 2025/04/30 10:09:41 client Dropping Handshake keys. 2025/04/30 10:09:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:41 client -> Sending packet 1 (44 bytes) for connection 738b6654a6a454c318c858ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003c4e57444da780b698e596aec, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 93.395µs} 2025/04/30 10:09:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:41 client -> Sending packet 2 (42 bytes) for connection 738b6654a6a454c318c858ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:41 client Short Header{DestConnectionID: 0000000000001003c4e57444da780b698e596aec, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:41 client Connection 738b6654a6a454c318c858ef closed. 2025/04/30 10:09:41 Requesting https://server4:443/pikoywfmnc. 2025/04/30 10:09:41 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:41 Increased send buffer size to 14336 kiB 2025/04/30 10:09:41 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:41 Created qlog file: /logs/qlog/8b393106ef1ac40467.sqlog 2025/04/30 10:09:41 client Starting new connection to server4 ([::]:46068 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8b393106ef1ac40467, version v1 2025/04/30 10:09:41 Adding connection ID (empty). 2025/04/30 10:09:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:41 client -> Sending packet 0 (1280 bytes) for connection 8b393106ef1ac40467, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 8b393106ef1ac40467, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:41 client -> Sending packet 1 (1280 bytes) for connection 8b393106ef1ac40467, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 8b393106ef1ac40467, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:41 client -> Sending packet 2 (1280 bytes) for connection 8b393106ef1ac40467, Initial 2025/04/30 10:09:41 client Long Header{Type: Initial, DestConnectionID: 8b393106ef1ac40467, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:42 client -> Sending packet 3 (1280 bytes) for connection 8b393106ef1ac40467, Initial 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: 8b393106ef1ac40467, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:42 client -> Sending packet 4 (1280 bytes) for connection 8b393106ef1ac40467, Initial 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: 8b393106ef1ac40467, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:42 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:42 client Received first packet. Switching destination connection ID to: 0000000000001003d32fb16cb4ed27e75e1cfba2 2025/04/30 10:09:42 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:42 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:09:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8b393106ef1ac40467, InitialSourceConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x9502849e34bb8d5ce5975f2b67575761} 2025/04/30 10:09:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8b393106ef1ac40467 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:42 client Dropping Initial keys. 2025/04/30 10:09:42 client -> Sending packet 1 (110 bytes) for connection 8b393106ef1ac40467, Handshake 2025/04/30 10:09:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:42 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.PingFrame{} 2025/04/30 10:09:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:42 client -> Sending packet 1 (44 bytes) for connection 8b393106ef1ac40467, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d32fb16cb4ed27e75e1cfba2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 105.218µs} 2025/04/30 10:09:42 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:42 client Dropping Handshake keys. 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003c779daf8503a907f4d152b57, StatelessResetToken: 0xfc6df974f38946b53ecec4fdb8393366} 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003f72d001a1b524f1a488468c2, StatelessResetToken: 0xdcfb9eb36a705b4630d8a36dd3d85e40} 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100322fc9b9d574635b7d1e9a172, StatelessResetToken: 0xce1892f43cbbe663547b0d6f5e8aea05} 2025/04/30 10:09:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:42 client -> Sending packet 2 (1366 bytes) for connection 8b393106ef1ac40467, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003c779daf8503a907f4d152b57, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.PingFrame{} 2025/04/30 10:09:42 client -> Sending packet 3 (46 bytes) for connection 8b393106ef1ac40467, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003c779daf8503a907f4d152b57, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 199.315µs} 2025/04/30 10:09:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:42 client <- Reading packet 3 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 26ms} 2025/04/30 10:09:42 client newly acked packets (1): [2] 2025/04/30 10:09:42 client updated RTT: 56.942223ms (σ: 28.471111ms) 2025/04/30 10:09:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:42 client lost packet 0 (time threshold) 2025/04/30 10:09:42 client -> Sending packet 4 (58 bytes) for connection 8b393106ef1ac40467, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003c779daf8503a907f4d152b57, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:42 client <- Reading packet 4 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:09:42 client newly acked packets (1): [4] 2025/04/30 10:09:42 client updated RTT: 53.88ms (σ: 27.477ms) 2025/04/30 10:09:42 client lost packet 3 (time threshold) 2025/04/30 10:09:42 client Canceling loss detection timer. 2025/04/30 10:09:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:42 client -> Sending packet 5 (46 bytes) for connection 8b393106ef1ac40467, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003c779daf8503a907f4d152b57, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 124.745µs} 2025/04/30 10:09:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:42 client -> Sending packet 6 (42 bytes) for connection 8b393106ef1ac40467, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003c779daf8503a907f4d152b57, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:42 client Connection 8b393106ef1ac40467 closed. 2025/04/30 10:09:42 Requesting https://server4:443/nxumwvbnlu. 2025/04/30 10:09:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:42 Increased send buffer size to 14336 kiB 2025/04/30 10:09:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:42 Created qlog file: /logs/qlog/bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2.sqlog 2025/04/30 10:09:42 client Starting new connection to server4 ([::]:47024 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, version v1 2025/04/30 10:09:42 Adding connection ID (empty). 2025/04/30 10:09:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:42 client -> Sending packet 0 (1280 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, Initial 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:09:42 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:42 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003ffc15a6f705073da1b459429, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:42 client Received first packet. Switching destination connection ID to: 0000000000001003ffc15a6f705073da1b459429 2025/04/30 10:09:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:42 client newly acked packets (1): [0] 2025/04/30 10:09:42 client updated RTT: 33.987985ms (σ: 16.993992ms) 2025/04/30 10:09:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:42 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003ffc15a6f705073da1b459429, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:09:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, InitialSourceConnectionID: 0000000000001003ffc15a6f705073da1b459429, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf9c3562b4c8f13e6f628465e2ad03a9e} 2025/04/30 10:09:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2 2025/04/30 10:09:42 client Long Header{Type: Initial, DestConnectionID: 0000000000001003ffc15a6f705073da1b459429, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003ffc15a6f705073da1b459429, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:42 client Dropping Initial keys. 2025/04/30 10:09:42 client -> Sending packet 1 (52 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, Handshake 2025/04/30 10:09:42 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003ffc15a6f705073da1b459429, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:42 client -> Sending packet 0 (58 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003ffc15a6f705073da1b459429, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:42 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:42 client Dropping Handshake keys. 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, StatelessResetToken: 0x89c87c9ecb16976787009efbb8b7fc04} 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100349362eed0e0b08baef0d1561, StatelessResetToken: 0x58b4cdb8e54c2ad71ab797bfbeaeb4e9} 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010031c1a05de1579e1ebfbde30ea, StatelessResetToken: 0xd86c87197407e0229390723d9cc1f54f} 2025/04/30 10:09:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:42 client -> Sending packet 1 (46 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.79µs} 2025/04/30 10:09:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:42 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.PingFrame{} 2025/04/30 10:09:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:42 client Sending ACK because the ACK timer expired. 2025/04/30 10:09:42 client -> Sending packet 2 (45 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.298307ms} 2025/04/30 10:09:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:42 client -> Sending packet 4 (58 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:42 client Skipping packet number 3 2025/04/30 10:09:42 client -> Sending packet 5 (41 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:42 client <- Reading packet 3 (65 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:42 client newly acked packets (2): [4 5] 2025/04/30 10:09:42 client updated RTT: 33.79ms (σ: 13.138ms) 2025/04/30 10:09:42 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:42 client Canceling loss detection timer. 2025/04/30 10:09:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003cfe313a07a57d5e9ddd807cf, StatelessResetToken: 0x7ad8137d3f444dfc5ae65fb4e98a5ad7} 2025/04/30 10:09:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:42 client -> Sending packet 6 (46 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 116.79µs} 2025/04/30 10:09:42 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.PingFrame{} 2025/04/30 10:09:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:42 client -> Sending packet 7 (1366 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.PingFrame{} 2025/04/30 10:09:42 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.PingFrame{} 2025/04/30 10:09:42 client -> Sending packet 8 (48 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:42 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:42 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 121.841µs} 2025/04/30 10:09:42 client <- Reading packet 7 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:42 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:42 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 26ms} 2025/04/30 10:09:42 client newly acked packets (1): [7] 2025/04/30 10:09:42 client updated RTT: 36.717ms (σ: 15.707ms) 2025/04/30 10:09:43 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.PingFrame{} 2025/04/30 10:09:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:43 client -> Sending packet 9 (1409 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.PingFrame{} 2025/04/30 10:09:43 client -> Sending packet 10 (50 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 165.471µs} 2025/04/30 10:09:43 client <- Reading packet 11 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 0s} 2025/04/30 10:09:43 client newly acked packets (1): [9] 2025/04/30 10:09:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:43 client -> Sending packet 11 (52 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 96.041µs} 2025/04/30 10:09:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:43 client -> Sending packet 12 (42 bytes) for connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 0000000000001003d559498bb0ced15c3fd5197a, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:43 client Connection bf89dfe7bc6d9505eee2f0906ff6ed6d3fc9e2 closed. 2025/04/30 10:09:43 Requesting https://server4:443/kxbeztkhpw. 2025/04/30 10:09:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:43 Increased send buffer size to 14336 kiB 2025/04/30 10:09:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:43 Created qlog file: /logs/qlog/ae9719295dce2450b13d3404a63b.sqlog 2025/04/30 10:09:43 client Starting new connection to server4 ([::]:33156 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ae9719295dce2450b13d3404a63b, version v1 2025/04/30 10:09:43 Adding connection ID (empty). 2025/04/30 10:09:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:43 client -> Sending packet 0 (1280 bytes) for connection ae9719295dce2450b13d3404a63b, Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: ae9719295dce2450b13d3404a63b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:43 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:43 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100362eabe60b03dad6621ed97de, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:43 client Received first packet. Switching destination connection ID to: 000000000000100362eabe60b03dad6621ed97de 2025/04/30 10:09:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:43 client newly acked packets (1): [0] 2025/04/30 10:09:43 client updated RTT: 34.046831ms (σ: 17.023415ms) 2025/04/30 10:09:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:43 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100362eabe60b03dad6621ed97de, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 10:09:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ae9719295dce2450b13d3404a63b, InitialSourceConnectionID: 000000000000100362eabe60b03dad6621ed97de, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xea4de21dd26ae2f972199fe5e4fc7bd3} 2025/04/30 10:09:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ae9719295dce2450b13d3404a63b 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: 000000000000100362eabe60b03dad6621ed97de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 000000000000100362eabe60b03dad6621ed97de, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:43 client Dropping Initial keys. 2025/04/30 10:09:43 client -> Sending packet 1 (110 bytes) for connection ae9719295dce2450b13d3404a63b, Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 000000000000100362eabe60b03dad6621ed97de, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100362eabe60b03dad6621ed97de, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:43 client -> Sending packet 2 (86 bytes) for connection ae9719295dce2450b13d3404a63b, Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 000000000000100362eabe60b03dad6621ed97de, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:43 client -> Sending packet 3 (86 bytes) for connection ae9719295dce2450b13d3404a63b, Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 000000000000100362eabe60b03dad6621ed97de, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:43 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:43 client Dropping Handshake keys. 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100308b635966619be62069dea73, StatelessResetToken: 0x975e199c11ccf7919253653e2b823e87} 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010034a18f75f322175841456ed07, StatelessResetToken: 0x7028ff9d1b2e01f7205b0333cdb9ee11} 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010033434c0b5134b6e9f79b8b46d, StatelessResetToken: 0x2ce42666f5f68d16693dfbf8de018169} 2025/04/30 10:09:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:43 client -> Sending packet 2 (65 bytes) for connection ae9719295dce2450b13d3404a63b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100308b635966619be62069dea73, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.457µs} 2025/04/30 10:09:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:43 client -> Sending packet 3 (60 bytes) for connection ae9719295dce2450b13d3404a63b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100308b635966619be62069dea73, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:43 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003ae48b3ddd37951536582dd14, StatelessResetToken: 0x88285360a6d46a722213c6db834f0397} 2025/04/30 10:09:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:43 client -> Sending packet 4 (42 bytes) for connection ae9719295dce2450b13d3404a63b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100308b635966619be62069dea73, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:43 client Connection ae9719295dce2450b13d3404a63b closed. 2025/04/30 10:09:43 Requesting https://server4:443/abtinaruiu. 2025/04/30 10:09:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:43 Increased send buffer size to 14336 kiB 2025/04/30 10:09:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:43 Created qlog file: /logs/qlog/c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6.sqlog 2025/04/30 10:09:43 client Starting new connection to server4 ([::]:57866 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, version v1 2025/04/30 10:09:43 Adding connection ID (empty). 2025/04/30 10:09:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:43 client -> Sending packet 0 (1280 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:09:43 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:43 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:43 client Received first packet. Switching destination connection ID to: 00000000000010037cb034a7f25bfcdcdf5719a3 2025/04/30 10:09:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:43 client newly acked packets (1): [0] 2025/04/30 10:09:43 client updated RTT: 33.959277ms (σ: 16.979638ms) 2025/04/30 10:09:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:43 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:09:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, InitialSourceConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7243b34d2042e1f6c909a2c6b29fa24f} 2025/04/30 10:09:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:43 client Dropping Initial keys. 2025/04/30 10:09:43 client -> Sending packet 1 (52 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:43 client -> Sending packet 0 (58 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:43 client -> Sending packet 2 (86 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:43 client -> Sending packet 3 (86 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, Handshake 2025/04/30 10:09:43 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037cb034a7f25bfcdcdf5719a3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:43 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:43 client Dropping Handshake keys. 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100324131973bd4d58c976936e39, StatelessResetToken: 0x8f94f7bef93a887ebf92f8e9708925be} 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010038a0c16ab563a4500a675fb44, StatelessResetToken: 0x72f6ab322d26c2d67d2290c82dfa81cc} 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010030c513c40caf78c6c40ea1d96, StatelessResetToken: 0xf20eda8b126bbea7557a79a41efcc335} 2025/04/30 10:09:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:43 client -> Sending packet 2 (65 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 94.017µs} 2025/04/30 10:09:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:43 client -> Sending packet 3 (60 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:43 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.PingFrame{} 2025/04/30 10:09:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:43 client -> Sending packet 4 (46 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 85.265µs} 2025/04/30 10:09:43 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.PingFrame{} 2025/04/30 10:09:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:43 client -> Sending packet 5 (1366 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.PingFrame{} 2025/04/30 10:09:43 client -> Sending packet 6 (48 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 118.703µs} 2025/04/30 10:09:43 client <- Reading packet 6 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.PingFrame{} 2025/04/30 10:09:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:43 client Sending ACK because the ACK timer expired. 2025/04/30 10:09:43 client -> Sending packet 7 (49 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.236385ms} 2025/04/30 10:09:43 client <- Reading packet 7 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:43 client newly acked packets (2): [3 5] 2025/04/30 10:09:43 client updated RTT: 33.699ms (σ: 13.252ms) 2025/04/30 10:09:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:43 client Canceling loss detection timer. 2025/04/30 10:09:43 client <- Reading packet 8 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:43 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:43 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003681871cf3f3edc7e0afa225f, StatelessResetToken: 0x0859541b18f1a5125a15f329bfe9041f} 2025/04/30 10:09:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:43 client -> Sending packet 8 (42 bytes) for connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:43 client Short Header{DestConnectionID: 000000000000100324131973bd4d58c976936e39, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:43 client Connection c5c29079de0d7d6c50a7f0bc9e01ad8ccd0ea6 closed. 2025/04/30 10:09:43 Requesting https://server4:443/erhvnuilyr. 2025/04/30 10:09:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:43 Increased send buffer size to 14336 kiB 2025/04/30 10:09:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:43 Created qlog file: /logs/qlog/99dfddd1a48e5e9825b499760a2fbc203783.sqlog 2025/04/30 10:09:43 client Starting new connection to server4 ([::]:35314 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 99dfddd1a48e5e9825b499760a2fbc203783, version v1 2025/04/30 10:09:43 Adding connection ID (empty). 2025/04/30 10:09:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:43 client -> Sending packet 0 (1280 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: 99dfddd1a48e5e9825b499760a2fbc203783, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:43 client -> Sending packet 1 (1280 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: 99dfddd1a48e5e9825b499760a2fbc203783, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:43 client -> Sending packet 2 (1280 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, Initial 2025/04/30 10:09:43 client Long Header{Type: Initial, DestConnectionID: 99dfddd1a48e5e9825b499760a2fbc203783, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:44 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:44 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:44 client Received first packet. Switching destination connection ID to: 0000000000001003cd0fb7a1dd9cd163afbd1094 2025/04/30 10:09:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:44 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:44 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 10:09:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 99dfddd1a48e5e9825b499760a2fbc203783, InitialSourceConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x9bc7f4189784cc86d877e85b3f615e8a} 2025/04/30 10:09:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:44 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:44 client Dropping Initial keys. 2025/04/30 10:09:44 client -> Sending packet 1 (110 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, Handshake 2025/04/30 10:09:44 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:44 client Short Header{DestConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:44 client -> Sending packet 2 (86 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, Handshake 2025/04/30 10:09:44 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:44 client -> Sending packet 3 (86 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, Handshake 2025/04/30 10:09:44 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cd0fb7a1dd9cd163afbd1094, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:44 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:44 client Dropping Handshake keys. 2025/04/30 10:09:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100322a6666872c78f8bc3328be5, StatelessResetToken: 0xcdffe9b3fe3dc81d120d38fa107152db} 2025/04/30 10:09:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003a836f69b2bf1b998d917c1c9, StatelessResetToken: 0xf84538783623c66cc250fcff2429857f} 2025/04/30 10:09:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003d11dbe67043435bf97057571, StatelessResetToken: 0xb1d3de11df0c47573115960156abc9a7} 2025/04/30 10:09:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:44 client -> Sending packet 2 (65 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:44 client Short Header{DestConnectionID: 000000000000100322a6666872c78f8bc3328be5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.519µs} 2025/04/30 10:09:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:44 client -> Sending packet 3 (60 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:44 client Short Header{DestConnectionID: 000000000000100322a6666872c78f8bc3328be5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:44 client -> Sending packet 4 (1366 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:44 client Short Header{DestConnectionID: 000000000000100322a6666872c78f8bc3328be5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:44 client -> &wire.PingFrame{} 2025/04/30 10:09:44 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000100364a75638045c44ff6ce11585, StatelessResetToken: 0xf9bf7416b91f77fff022cbf0c1b87dae} 2025/04/30 10:09:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:44 client <- Reading packet 2 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:44 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:44 client newly acked packets (1): [4] 2025/04/30 10:09:44 client updated RTT: 32.425765ms (σ: 16.212882ms) 2025/04/30 10:09:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:44 client setting loss timer for packet 3 (1-RTT) to 36.478985ms (in 2025-04-30 10:09:44.281401756 +0000 UTC m=+7.311861921) 2025/04/30 10:09:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:44 client -> Sending packet 5 (42 bytes) for connection 99dfddd1a48e5e9825b499760a2fbc203783, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:44 client Short Header{DestConnectionID: 000000000000100322a6666872c78f8bc3328be5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:44 client Connection 99dfddd1a48e5e9825b499760a2fbc203783 closed. 2025/04/30 10:09:44 Requesting https://server4:443/ifcxukxrau. 2025/04/30 10:09:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:44 Increased send buffer size to 14336 kiB 2025/04/30 10:09:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:44 Created qlog file: /logs/qlog/32ffe08a0871520f47f03c87860535e7b24207.sqlog 2025/04/30 10:09:44 client Starting new connection to server4 ([::]:45192 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 32ffe08a0871520f47f03c87860535e7b24207, version v1 2025/04/30 10:09:44 Adding connection ID (empty). 2025/04/30 10:09:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:44 client -> Sending packet 0 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:44 client -> Sending packet 1 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:44 client -> Sending packet 2 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:44 client -> Sending packet 3 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:44 client -> Sending packet 4 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:44 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:09:45 client -> Sending packet 5 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:45 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:45 client -> Sending packet 6 (1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Initial 2025/04/30 10:09:45 client Long Header{Type: Initial, DestConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:09:45 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:45 client <- Reading packet 2 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:45 client Received first packet. Switching destination connection ID to: 00000000000010031f6142a6a5e01dbeef2c8358 2025/04/30 10:09:45 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:45 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:45 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 10:09:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 32ffe08a0871520f47f03c87860535e7b24207, InitialSourceConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x867c7d073db0034bb40a934ea8d1bfdd} 2025/04/30 10:09:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207 2025/04/30 10:09:45 client Long Header{Type: Initial, DestConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:45 client Long Header{Type: Handshake, DestConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:45 client Dropping Initial keys. 2025/04/30 10:09:45 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:45 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:45 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:45 client <- Reading packet 3 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, PacketNumber: 3, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 10:09:45 client -> Sending packet 1 (110 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, Handshake 2025/04/30 10:09:45 client Long Header{Type: Handshake, DestConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:45 client Short Header{DestConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:45 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:45 client <- &wire.PingFrame{} 2025/04/30 10:09:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:45 client -> Sending packet 1 (44 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:45 client Short Header{DestConnectionID: 00000000000010031f6142a6a5e01dbeef2c8358, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 74.39µs} 2025/04/30 10:09:45 client <- Reading packet 3 (1178 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:45 client Peer doesn't await address validation any longer. 2025/04/30 10:09:45 client newly acked packets (1): [0] 2025/04/30 10:09:45 client Canceling loss detection timer. 2025/04/30 10:09:45 client Dropping Handshake keys. 2025/04/30 10:09:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010038feefc450682253fc2ece332, StatelessResetToken: 0x2a33aac366fd44e28a31d8bdf18ca8b1} 2025/04/30 10:09:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003d69da3118a1854dce0a2b7c5, StatelessResetToken: 0xa0b4931eaedaa10af5a3a199d30fac15} 2025/04/30 10:09:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100351449e4f86799f9af1b23fcf, StatelessResetToken: 0x946b7f739951fee5eade47f4f89b9d28} 2025/04/30 10:09:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:45 client -> Sending packet 2 (1366 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:45 client Short Header{DestConnectionID: 00000000000010038feefc450682253fc2ece332, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:45 client -> &wire.PingFrame{} 2025/04/30 10:09:45 client -> Sending packet 3 (46 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:45 client Short Header{DestConnectionID: 00000000000010038feefc450682253fc2ece332, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 215.425µs} 2025/04/30 10:09:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:45 client -> Sending packet 4 (42 bytes) for connection 32ffe08a0871520f47f03c87860535e7b24207, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:45 client Short Header{DestConnectionID: 00000000000010038feefc450682253fc2ece332, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:45 client Connection 32ffe08a0871520f47f03c87860535e7b24207 closed. 2025/04/30 10:09:45 Requesting https://server4:443/izqecwfosz. 2025/04/30 10:09:45 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:45 Increased send buffer size to 14336 kiB 2025/04/30 10:09:45 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:45 Created qlog file: /logs/qlog/aa3ede6b4e046c166f.sqlog 2025/04/30 10:09:45 client Starting new connection to server4 ([::]:43547 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aa3ede6b4e046c166f, version v1 2025/04/30 10:09:45 Adding connection ID (empty). 2025/04/30 10:09:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:45 client -> Sending packet 0 (1280 bytes) for connection aa3ede6b4e046c166f, Initial 2025/04/30 10:09:45 client Long Header{Type: Initial, DestConnectionID: aa3ede6b4e046c166f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:09:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:46 client -> Sending packet 1 (1280 bytes) for connection aa3ede6b4e046c166f, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: aa3ede6b4e046c166f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:09:46 client -> Sending packet 2 (1280 bytes) for connection aa3ede6b4e046c166f, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: aa3ede6b4e046c166f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:46 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003a24ade8613781fd58e3086b5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:46 client Received first packet. Switching destination connection ID to: 0000000000001003a24ade8613781fd58e3086b5 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:46 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003a24ade8613781fd58e3086b5, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:09:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aa3ede6b4e046c166f, InitialSourceConnectionID: 0000000000001003a24ade8613781fd58e3086b5, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1cd84eee8e33ff2ce5cdaac98b168a03} 2025/04/30 10:09:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aa3ede6b4e046c166f 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 0000000000001003a24ade8613781fd58e3086b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a24ade8613781fd58e3086b5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:46 client Dropping Initial keys. 2025/04/30 10:09:46 client -> Sending packet 1 (52 bytes) for connection aa3ede6b4e046c166f, Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a24ade8613781fd58e3086b5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:46 client -> Sending packet 0 (58 bytes) for connection aa3ede6b4e046c166f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003a24ade8613781fd58e3086b5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:46 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:46 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003a24ade8613781fd58e3086b5, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:09:46 client -> Sending packet 2 (52 bytes) for connection aa3ede6b4e046c166f, Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a24ade8613781fd58e3086b5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:46 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:46 client Dropping Handshake keys. 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003e7c0ebea3f1237cc8a9d1b1d, StatelessResetToken: 0xca667e6065b6c8ec18036a350d3b906f} 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010032a2a3398dbe20fe5cf0b8171, StatelessResetToken: 0x91213dc2f321eaa15c840cdffe9049b7} 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003871eadfccff52538a964d62b, StatelessResetToken: 0x21db3fca190522cae6c362b9b7dc2ed1} 2025/04/30 10:09:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:46 client -> Sending packet 1 (1366 bytes) for connection aa3ede6b4e046c166f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003e7c0ebea3f1237cc8a9d1b1d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.PingFrame{} 2025/04/30 10:09:46 client -> Sending packet 2 (46 bytes) for connection aa3ede6b4e046c166f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003e7c0ebea3f1237cc8a9d1b1d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 139.913µs} 2025/04/30 10:09:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:46 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:46 client newly acked packets (1): [0] 2025/04/30 10:09:46 client updated RTT: 33.853971ms (σ: 16.926985ms) 2025/04/30 10:09:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:46 client -> Sending packet 3 (42 bytes) for connection aa3ede6b4e046c166f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003e7c0ebea3f1237cc8a9d1b1d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:46 client Connection aa3ede6b4e046c166f closed. 2025/04/30 10:09:46 Requesting https://server4:443/jdkqwvwqte. 2025/04/30 10:09:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:46 Increased send buffer size to 14336 kiB 2025/04/30 10:09:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:46 Created qlog file: /logs/qlog/a77f5fb8376d411501f3aca592fd.sqlog 2025/04/30 10:09:46 client Starting new connection to server4 ([::]:37426 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a77f5fb8376d411501f3aca592fd, version v1 2025/04/30 10:09:46 Adding connection ID (empty). 2025/04/30 10:09:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:46 client -> Sending packet 0 (1280 bytes) for connection a77f5fb8376d411501f3aca592fd, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: a77f5fb8376d411501f3aca592fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:46 client -> Sending packet 1 (1280 bytes) for connection a77f5fb8376d411501f3aca592fd, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: a77f5fb8376d411501f3aca592fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:46 client -> Sending packet 2 (1280 bytes) for connection a77f5fb8376d411501f3aca592fd, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: a77f5fb8376d411501f3aca592fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:09:46 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:09:46 client Received first packet. Switching destination connection ID to: 0000000000001003fa267e86122b2a85cd1beba4 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:46 client newly acked packets (1): [2] 2025/04/30 10:09:46 client updated RTT: 33.980296ms (σ: 16.990148ms) 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:09:46 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a77f5fb8376d411501f3aca592fd, InitialSourceConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8e26b208cf858e4bf6993606f6482921} 2025/04/30 10:09:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a77f5fb8376d411501f3aca592fd 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:46 client Dropping Initial keys. 2025/04/30 10:09:46 client -> Sending packet 1 (52 bytes) for connection a77f5fb8376d411501f3aca592fd, Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:46 client -> Sending packet 0 (58 bytes) for connection a77f5fb8376d411501f3aca592fd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:46 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:46 client Peer doesn't await address validation any longer. 2025/04/30 10:09:46 client newly acked packets (1): [0] 2025/04/30 10:09:46 client updated RTT: 33.96ms (σ: 12.78ms) 2025/04/30 10:09:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:46 client Canceling loss detection timer. 2025/04/30 10:09:46 client Dropping Handshake keys. 2025/04/30 10:09:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:46 client -> Sending packet 1 (44 bytes) for connection a77f5fb8376d411501f3aca592fd, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 117.902µs} 2025/04/30 10:09:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:46 client -> Sending packet 2 (42 bytes) for connection a77f5fb8376d411501f3aca592fd, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003fa267e86122b2a85cd1beba4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:46 client Connection a77f5fb8376d411501f3aca592fd closed. 2025/04/30 10:09:46 Requesting https://server4:443/kdgbryojqy. 2025/04/30 10:09:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:46 Increased send buffer size to 14336 kiB 2025/04/30 10:09:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:46 Created qlog file: /logs/qlog/485164b023d64999fc8d5360f67ecbd1.sqlog 2025/04/30 10:09:46 client Starting new connection to server4 ([::]:55683 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 485164b023d64999fc8d5360f67ecbd1, version v1 2025/04/30 10:09:46 Adding connection ID (empty). 2025/04/30 10:09:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:46 client -> Sending packet 0 (1280 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 485164b023d64999fc8d5360f67ecbd1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:46 client -> Sending packet 1 (1280 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 485164b023d64999fc8d5360f67ecbd1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:46 client -> Sending packet 2 (1280 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 485164b023d64999fc8d5360f67ecbd1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:46 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003436bf31a27296f8229edad53, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:46 client Received first packet. Switching destination connection ID to: 0000000000001003436bf31a27296f8229edad53 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:46 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003436bf31a27296f8229edad53, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:09:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 485164b023d64999fc8d5360f67ecbd1, InitialSourceConnectionID: 0000000000001003436bf31a27296f8229edad53, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x376010300d6eae1734c8224e14ba9457} 2025/04/30 10:09:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 485164b023d64999fc8d5360f67ecbd1 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 0000000000001003436bf31a27296f8229edad53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003436bf31a27296f8229edad53, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:46 client Dropping Initial keys. 2025/04/30 10:09:46 client -> Sending packet 1 (110 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003436bf31a27296f8229edad53, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:46 client Short Header{DestConnectionID: 0000000000001003436bf31a27296f8229edad53, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:46 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:46 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:46 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003436bf31a27296f8229edad53, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:09:46 client -> Sending packet 2 (52 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, Handshake 2025/04/30 10:09:46 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003436bf31a27296f8229edad53, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:46 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:46 client Dropping Handshake keys. 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100358d1c78574826102dd8d8999, StatelessResetToken: 0xd0aeeb329694d7c7b524d58d6d32ec01} 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010039fcab2883f73fb8d25d90939, StatelessResetToken: 0xd17065ff2b0644b226fcd8464e7e2918} 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003404b1d766bbe53a494e1da5f, StatelessResetToken: 0x876d30ef2bd79dd45f63bebacc56f698} 2025/04/30 10:09:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:46 client -> Sending packet 1 (1366 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.PingFrame{} 2025/04/30 10:09:46 client -> Sending packet 2 (46 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 218.681µs} 2025/04/30 10:09:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:46 client <- Reading packet 1 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:46 client newly acked packets (1): [2] 2025/04/30 10:09:46 client updated RTT: 32.071651ms (σ: 16.035825ms) 2025/04/30 10:09:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:46 client lost packet 0 (time threshold) 2025/04/30 10:09:46 client setting loss timer for packet 1 (1-RTT) to 36.080607ms (in 2025-04-30 10:09:46.725197414 +0000 UTC m=+9.755657578) 2025/04/30 10:09:46 client Canceling loss detection timer. 2025/04/30 10:09:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010038bd70b1e6dd81757b059244e, StatelessResetToken: 0xc0e6efb5cadc64208e7aaa3ce50812a1} 2025/04/30 10:09:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:46 client Ignoring all packets below 1. 2025/04/30 10:09:46 client -> Sending packet 3 (63 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 142.808µs} 2025/04/30 10:09:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:46 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:09:46.725197414 +0000 UTC m=+9.755657578 2025/04/30 10:09:46 client lost packet 1 (time threshold) 2025/04/30 10:09:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:46 client -> Sending packet 5 (58 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:46 client -> Sending packet 6 (58 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:46 client <- Reading packet 3 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:46 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:46 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:46 client -> Sending packet 7 (1323 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.PingFrame{} 2025/04/30 10:09:46 client -> Sending packet 8 (46 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 137.439µs} 2025/04/30 10:09:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:46 client -> Sending packet 9 (42 bytes) for connection 485164b023d64999fc8d5360f67ecbd1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:46 client Short Header{DestConnectionID: 000000000000100358d1c78574826102dd8d8999, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:46 client Connection 485164b023d64999fc8d5360f67ecbd1 closed. 2025/04/30 10:09:46 Requesting https://server4:443/isyvhboinl. 2025/04/30 10:09:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:46 Increased send buffer size to 14336 kiB 2025/04/30 10:09:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:46 Created qlog file: /logs/qlog/1178794078fbc54f43a61d4828d6faffae54ae.sqlog 2025/04/30 10:09:46 client Starting new connection to server4 ([::]:46861 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1178794078fbc54f43a61d4828d6faffae54ae, version v1 2025/04/30 10:09:46 Adding connection ID (empty). 2025/04/30 10:09:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:46 client -> Sending packet 0 (1280 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, Initial 2025/04/30 10:09:46 client Long Header{Type: Initial, DestConnectionID: 1178794078fbc54f43a61d4828d6faffae54ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:09:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:47 client -> Sending packet 1 (1280 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, Initial 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: 1178794078fbc54f43a61d4828d6faffae54ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:09:47 client -> Sending packet 2 (1280 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, Initial 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: 1178794078fbc54f43a61d4828d6faffae54ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:09:47 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:09:47 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010036b1e00f17874d3117c9e275f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:09:47 client Received first packet. Switching destination connection ID to: 00000000000010036b1e00f17874d3117c9e275f 2025/04/30 10:09:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:47 client newly acked packets (1): [2] 2025/04/30 10:09:47 client updated RTT: 34.205762ms (σ: 17.102881ms) 2025/04/30 10:09:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:47 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:09:47 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:09:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010036b1e00f17874d3117c9e275f, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:09:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:09:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1178794078fbc54f43a61d4828d6faffae54ae, InitialSourceConnectionID: 00000000000010036b1e00f17874d3117c9e275f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xccb0791e8ffa347f19e88c16e03e7714} 2025/04/30 10:09:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:47 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:47 client Dropping Initial keys. 2025/04/30 10:09:47 client -> Sending packet 1 (110 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, Handshake 2025/04/30 10:09:47 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:47 client Short Header{DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:47 client -> Sending packet 2 (86 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, Handshake 2025/04/30 10:09:47 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:47 client -> Sending packet 3 (86 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, Handshake 2025/04/30 10:09:47 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:47 client <- Reading packet 2 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.PingFrame{} 2025/04/30 10:09:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:47 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.PingFrame{} 2025/04/30 10:09:47 client -> Sending packet 1 (44 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 101.942µs} 2025/04/30 10:09:47 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.PingFrame{} 2025/04/30 10:09:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:47 client Sending ACK because the ACK timer expired. 2025/04/30 10:09:47 client -> Sending packet 2 (45 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 00000000000010036b1e00f17874d3117c9e275f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.24409ms} 2025/04/30 10:09:47 client <- Reading packet 5 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:47 client Dropping Handshake keys. 2025/04/30 10:09:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003af855944915775a5a79a8582, StatelessResetToken: 0xe35e30533988a24cdeed2e71b9ecdc40} 2025/04/30 10:09:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003bccab803730e219846125363, StatelessResetToken: 0x5c45be90ed6de6db132291502cec741c} 2025/04/30 10:09:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003d271bb2884855a6a182d27a9, StatelessResetToken: 0x616d3cad2d888fa77a6aa0c0422b73d4} 2025/04/30 10:09:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:47 client -> Sending packet 4 (65 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 0000000000001003af855944915775a5a79a8582, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 115.077µs} 2025/04/30 10:09:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:47 client -> Sending packet 5 (60 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 0000000000001003af855944915775a5a79a8582, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:47 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.PingFrame{} 2025/04/30 10:09:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:47 client -> Sending packet 6 (46 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 0000000000001003af855944915775a5a79a8582, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 2}}, DelayTime: 76.805µs} 2025/04/30 10:09:47 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.PingFrame{} 2025/04/30 10:09:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:47 client Sending ACK because the ACK timer expired. 2025/04/30 10:09:47 client -> Sending packet 7 (47 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 0000000000001003af855944915775a5a79a8582, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 2}}, DelayTime: 25.236563ms} 2025/04/30 10:09:47 client <- Reading packet 10 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:47 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:47 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:09:47 client newly acked packets (1): [5] 2025/04/30 10:09:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:47 client Canceling loss detection timer. 2025/04/30 10:09:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003b857388403320b9dc53eddc5, StatelessResetToken: 0x807383aca444128ea6d12761c5d6b38b} 2025/04/30 10:09:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:47 client -> Sending packet 8 (42 bytes) for connection 1178794078fbc54f43a61d4828d6faffae54ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:47 client Short Header{DestConnectionID: 0000000000001003af855944915775a5a79a8582, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:47 client Connection 1178794078fbc54f43a61d4828d6faffae54ae closed. 2025/04/30 10:09:47 Requesting https://server4:443/rxsqyaxjff. 2025/04/30 10:09:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:47 Increased send buffer size to 14336 kiB 2025/04/30 10:09:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:47 Created qlog file: /logs/qlog/1e751f96493ec551881f.sqlog 2025/04/30 10:09:47 client Starting new connection to server4 ([::]:41057 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1e751f96493ec551881f, version v1 2025/04/30 10:09:47 Adding connection ID (empty). 2025/04/30 10:09:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:47 client -> Sending packet 0 (1280 bytes) for connection 1e751f96493ec551881f, Initial 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: 1e751f96493ec551881f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:47 client -> Sending packet 1 (1280 bytes) for connection 1e751f96493ec551881f, Initial 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: 1e751f96493ec551881f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:47 client -> Sending packet 2 (1280 bytes) for connection 1e751f96493ec551881f, Initial 2025/04/30 10:09:47 client Long Header{Type: Initial, DestConnectionID: 1e751f96493ec551881f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:48 client -> Sending packet 3 (1280 bytes) for connection 1e751f96493ec551881f, Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: 1e751f96493ec551881f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:48 client -> Sending packet 4 (1280 bytes) for connection 1e751f96493ec551881f, Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: 1e751f96493ec551881f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:48 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:48 client Received first packet. Switching destination connection ID to: 0000000000001003d64aedb9eba188e8d15701d5 2025/04/30 10:09:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:48 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1e751f96493ec551881f, InitialSourceConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x598e1ec33c58e9d923546e9d889ff33d} 2025/04/30 10:09:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1e751f96493ec551881f 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:48 client Dropping Initial keys. 2025/04/30 10:09:48 client -> Sending packet 1 (52 bytes) for connection 1e751f96493ec551881f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:48 client -> Sending packet 0 (58 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:48 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:48 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:48 client -> Sending packet 2 (52 bytes) for connection 1e751f96493ec551881f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003d64aedb9eba188e8d15701d5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:48 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:48 client Dropping Handshake keys. 2025/04/30 10:09:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003fe4932741c147165410d8901, StatelessResetToken: 0xd8ff1643ba1d78902a24a26ce6d4a3c5} 2025/04/30 10:09:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003d7e417737693b28b836084ed, StatelessResetToken: 0xe2bb4d2adb4e67347bddc33a908c7a0a} 2025/04/30 10:09:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003c76830b753d036005fe3e313, StatelessResetToken: 0xe8cd6e0e81b9dfacb505730e4c845954} 2025/04/30 10:09:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:48 client -> Sending packet 1 (1366 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003fe4932741c147165410d8901, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.PingFrame{} 2025/04/30 10:09:48 client -> Sending packet 2 (46 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003fe4932741c147165410d8901, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160.131µs} 2025/04/30 10:09:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:48 client <- Reading packet 1 (24 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 26ms} 2025/04/30 10:09:48 client newly acked packets (1): [1] 2025/04/30 10:09:48 client updated RTT: 57.070219ms (σ: 28.535109ms) 2025/04/30 10:09:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:48 client lost packet 0 (time threshold) 2025/04/30 10:09:48 client -> Sending packet 3 (58 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003fe4932741c147165410d8901, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:48 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.PingFrame{} 2025/04/30 10:09:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:48 client -> Sending packet 4 (46 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003fe4932741c147165410d8901, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 81.984µs} 2025/04/30 10:09:48 client <- Reading packet 4 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:09:48 client newly acked packets (1): [3] 2025/04/30 10:09:48 client lost packet 2 (time threshold) 2025/04/30 10:09:48 client Canceling loss detection timer. 2025/04/30 10:09:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:48 client -> Sending packet 5 (48 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003fe4932741c147165410d8901, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 151.555µs} 2025/04/30 10:09:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:48 client -> Sending packet 6 (42 bytes) for connection 1e751f96493ec551881f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003fe4932741c147165410d8901, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:48 client Connection 1e751f96493ec551881f closed. 2025/04/30 10:09:48 Requesting https://server4:443/mdudqzavev. 2025/04/30 10:09:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:48 Increased send buffer size to 14336 kiB 2025/04/30 10:09:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:48 Created qlog file: /logs/qlog/f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666.sqlog 2025/04/30 10:09:48 client Starting new connection to server4 ([::]:42286 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, version v1 2025/04/30 10:09:48 Adding connection ID (empty). 2025/04/30 10:09:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:48 client -> Sending packet 0 (1280 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:09:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:48 client -> Sending packet 1 (1280 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:09:48 client -> Sending packet 2 (1280 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:48 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:48 client Received first packet. Switching destination connection ID to: 00000000000010031a79f8e17b9357eabc6ff8fe 2025/04/30 10:09:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:48 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:09:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, InitialSourceConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x4cf41448685278bab18b64f791a8c862} 2025/04/30 10:09:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:48 client Dropping Initial keys. 2025/04/30 10:09:48 client -> Sending packet 1 (52 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:48 client -> Sending packet 0 (58 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 00000000000010031a79f8e17b9357eabc6ff8fe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:48 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:48 client Dropping Handshake keys. 2025/04/30 10:09:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010035c961f9ad1dcc59fe26ba5c3, StatelessResetToken: 0x26f8f2782d3109b861348974131321bf} 2025/04/30 10:09:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100346b967e1dd143eff8de3efc2, StatelessResetToken: 0x34482207f3a552d16e280563519c2f4e} 2025/04/30 10:09:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003be7b62d7a26598087a38076e, StatelessResetToken: 0x74d8e45399759f670490867e4bfb34e9} 2025/04/30 10:09:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:48 client -> Sending packet 1 (1366 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 00000000000010035c961f9ad1dcc59fe26ba5c3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.PingFrame{} 2025/04/30 10:09:48 client -> Sending packet 2 (46 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 00000000000010035c961f9ad1dcc59fe26ba5c3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176.913µs} 2025/04/30 10:09:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:48 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:48 client newly acked packets (1): [0] 2025/04/30 10:09:48 client updated RTT: 33.987259ms (σ: 16.993629ms) 2025/04/30 10:09:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:48 client -> Sending packet 3 (42 bytes) for connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 00000000000010035c961f9ad1dcc59fe26ba5c3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:48 client Connection f3dfe9b7d38c97fcd6c3cd44382bb6db0d3666 closed. 2025/04/30 10:09:48 Requesting https://server4:443/zgjlwqptos. 2025/04/30 10:09:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:48 Increased send buffer size to 14336 kiB 2025/04/30 10:09:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:48 Created qlog file: /logs/qlog/d99c9d4b7255e18593f57dfc0ec50ffbb04f.sqlog 2025/04/30 10:09:48 client Starting new connection to server4 ([::]:60516 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d99c9d4b7255e18593f57dfc0ec50ffbb04f, version v1 2025/04/30 10:09:48 Adding connection ID (empty). 2025/04/30 10:09:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:48 client -> Sending packet 0 (1280 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: d99c9d4b7255e18593f57dfc0ec50ffbb04f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:48 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:48 client Received first packet. Switching destination connection ID to: 0000000000001003a21cac7290bd9d3e9fc4e18e 2025/04/30 10:09:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:48 client newly acked packets (1): [0] 2025/04/30 10:09:48 client updated RTT: 33.931558ms (σ: 16.965779ms) 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:48 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 10:09:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d99c9d4b7255e18593f57dfc0ec50ffbb04f, InitialSourceConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x19f278cfabdc882bf827bb80a8b609b9} 2025/04/30 10:09:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f 2025/04/30 10:09:48 client Long Header{Type: Initial, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:48 client Dropping Initial keys. 2025/04/30 10:09:48 client -> Sending packet 1 (52 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:48 client -> Sending packet 0 (58 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:48 client -> Sending packet 2 (86 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:48 client -> Sending packet 3 (86 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:48 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.PingFrame{} 2025/04/30 10:09:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:48 client -> Sending packet 1 (44 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 70.592µs} 2025/04/30 10:09:48 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:48 client <- &wire.PingFrame{} 2025/04/30 10:09:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:48 client -> Sending packet 2 (46 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:48 client Short Header{DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 91.803µs} 2025/04/30 10:09:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:09:48 client -> Sending packet 4 (86 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:48 client -> Sending packet 5 (86 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, Handshake 2025/04/30 10:09:48 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:49 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.PingFrame{} 2025/04/30 10:09:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:49 client <- Reading packet 7 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.PingFrame{} 2025/04/30 10:09:49 client -> Sending packet 3 (48 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 112.76µs} 2025/04/30 10:09:49 client <- Reading packet 10 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.PingFrame{} 2025/04/30 10:09:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:49 client -> Sending packet 4 (50 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003a21cac7290bd9d3e9fc4e18e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 106.58µs} 2025/04/30 10:09:49 client <- Reading packet 11 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:49 client Dropping Handshake keys. 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003149926c28caf4fbeabaedff3, StatelessResetToken: 0x037ada8bbea8f689695d166df6b372b1} 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100384b3fa1d6e2fe17ed553bee5, StatelessResetToken: 0x8ab9664013ff776ee9f19faf5336a897} 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100311f9753f347e570669b7a13a, StatelessResetToken: 0x6f2024d844b741eab55d9d31ef871e92} 2025/04/30 10:09:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:49 client -> Sending packet 6 (71 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003149926c28caf4fbeabaedff3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 118.432µs} 2025/04/30 10:09:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:49 client -> Sending packet 7 (60 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003149926c28caf4fbeabaedff3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:49 client <- Reading packet 12 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010037e6b4039bcdc42273b603fc2, StatelessResetToken: 0x17bb4921ccf5ea7bad47580082c9fb62} 2025/04/30 10:09:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:49 client -> Sending packet 8 (42 bytes) for connection d99c9d4b7255e18593f57dfc0ec50ffbb04f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003149926c28caf4fbeabaedff3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:49 client Connection d99c9d4b7255e18593f57dfc0ec50ffbb04f closed. 2025/04/30 10:09:49 Requesting https://server4:443/wqzvvnxmog. 2025/04/30 10:09:49 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:49 Increased send buffer size to 14336 kiB 2025/04/30 10:09:49 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:49 Created qlog file: /logs/qlog/70fc4653b16f3d15.sqlog 2025/04/30 10:09:49 client Starting new connection to server4 ([::]:37917 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 70fc4653b16f3d15, version v1 2025/04/30 10:09:49 Adding connection ID (empty). 2025/04/30 10:09:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:49 client -> Sending packet 0 (1280 bytes) for connection 70fc4653b16f3d15, Initial 2025/04/30 10:09:49 client Long Header{Type: Initial, DestConnectionID: 70fc4653b16f3d15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:09:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:49 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:49 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c55e95770f8b7efaf828af50, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:49 client Received first packet. Switching destination connection ID to: 0000000000001003c55e95770f8b7efaf828af50 2025/04/30 10:09:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:49 client newly acked packets (1): [0] 2025/04/30 10:09:49 client updated RTT: 33.957493ms (σ: 16.978746ms) 2025/04/30 10:09:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:49 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:49 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c55e95770f8b7efaf828af50, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:09:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 70fc4653b16f3d15, InitialSourceConnectionID: 0000000000001003c55e95770f8b7efaf828af50, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6a0cd7e294c7a54905cfcc87fbf9b6f3} 2025/04/30 10:09:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 70fc4653b16f3d15 2025/04/30 10:09:49 client Long Header{Type: Initial, DestConnectionID: 0000000000001003c55e95770f8b7efaf828af50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:49 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c55e95770f8b7efaf828af50, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:49 client Dropping Initial keys. 2025/04/30 10:09:49 client -> Sending packet 1 (110 bytes) for connection 70fc4653b16f3d15, Handshake 2025/04/30 10:09:49 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c55e95770f8b7efaf828af50, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003c55e95770f8b7efaf828af50, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:49 client -> Sending packet 2 (86 bytes) for connection 70fc4653b16f3d15, Handshake 2025/04/30 10:09:49 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c55e95770f8b7efaf828af50, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:49 client -> Sending packet 3 (86 bytes) for connection 70fc4653b16f3d15, Handshake 2025/04/30 10:09:49 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c55e95770f8b7efaf828af50, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:49 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:49 client Dropping Handshake keys. 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003c40cb8067363021353b32cd2, StatelessResetToken: 0xc0fc0e9f6877a802c4b6d3a974df394f} 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010039f5d38abdeab12e24a2ccee3, StatelessResetToken: 0xfffb382e75ca8a9ab4bd8959d58d8838} 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010035a8fc2db2733c9ed45c43033, StatelessResetToken: 0xbe05d0d84ec3ee00d2c85599e22a5de3} 2025/04/30 10:09:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:49 client -> Sending packet 2 (65 bytes) for connection 70fc4653b16f3d15, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003c40cb8067363021353b32cd2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 126.257µs} 2025/04/30 10:09:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:49 client -> Sending packet 3 (60 bytes) for connection 70fc4653b16f3d15, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003c40cb8067363021353b32cd2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:49 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010039df6781104a045b74fca7964, StatelessResetToken: 0x785f4ea1b8e275666a0e4bc5f8968248} 2025/04/30 10:09:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:49 client -> Sending packet 4 (42 bytes) for connection 70fc4653b16f3d15, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:49 client Short Header{DestConnectionID: 0000000000001003c40cb8067363021353b32cd2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:49 client Connection 70fc4653b16f3d15 closed. 2025/04/30 10:09:49 Requesting https://server4:443/eujafamsnx. 2025/04/30 10:09:49 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:49 Increased send buffer size to 14336 kiB 2025/04/30 10:09:49 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:49 Created qlog file: /logs/qlog/60509e83ec27671870be1c.sqlog 2025/04/30 10:09:49 client Starting new connection to server4 ([::]:35449 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 60509e83ec27671870be1c, version v1 2025/04/30 10:09:49 Adding connection ID (empty). 2025/04/30 10:09:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:49 client -> Sending packet 0 (1280 bytes) for connection 60509e83ec27671870be1c, Initial 2025/04/30 10:09:49 client Long Header{Type: Initial, DestConnectionID: 60509e83ec27671870be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:09:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:49 client -> Sending packet 1 (1280 bytes) for connection 60509e83ec27671870be1c, Initial 2025/04/30 10:09:49 client Long Header{Type: Initial, DestConnectionID: 60509e83ec27671870be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:09:49 client -> Sending packet 2 (1280 bytes) for connection 60509e83ec27671870be1c, Initial 2025/04/30 10:09:49 client Long Header{Type: Initial, DestConnectionID: 60509e83ec27671870be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:09:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:50 client -> Sending packet 3 (1280 bytes) for connection 60509e83ec27671870be1c, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 60509e83ec27671870be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:09:50 client -> Sending packet 4 (1280 bytes) for connection 60509e83ec27671870be1c, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 60509e83ec27671870be1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:09:50 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:09:50 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003119cf525d77e7eff45bcf207, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:09:50 client Received first packet. Switching destination connection ID to: 0000000000001003119cf525d77e7eff45bcf207 2025/04/30 10:09:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:50 client newly acked packets (1): [4] 2025/04/30 10:09:50 client updated RTT: 34.178543ms (σ: 17.089271ms) 2025/04/30 10:09:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:50 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:09:50 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:09:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003119cf525d77e7eff45bcf207, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:09:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:09:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 60509e83ec27671870be1c, InitialSourceConnectionID: 0000000000001003119cf525d77e7eff45bcf207, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x0f8584f550354040357949c19c60f507} 2025/04/30 10:09:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 60509e83ec27671870be1c 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 0000000000001003119cf525d77e7eff45bcf207, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:50 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003119cf525d77e7eff45bcf207, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:50 client Dropping Initial keys. 2025/04/30 10:09:50 client -> Sending packet 1 (110 bytes) for connection 60509e83ec27671870be1c, Handshake 2025/04/30 10:09:50 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003119cf525d77e7eff45bcf207, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:50 client Short Header{DestConnectionID: 0000000000001003119cf525d77e7eff45bcf207, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:50 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:50 client Dropping Handshake keys. 2025/04/30 10:09:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003ec6804619a0ea3d848381c42, StatelessResetToken: 0x17d57ae16098d8ab573ec61d3f2e0eb3} 2025/04/30 10:09:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100386c7a11b15e26c11e1edf9d1, StatelessResetToken: 0xeb8a74bbcad3e3380b88f9cd6cd7e133} 2025/04/30 10:09:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003eb9747a18bf9428fb05bcef1, StatelessResetToken: 0x41f62b2585c3899cd2befad15c27e91d} 2025/04/30 10:09:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:50 client -> Sending packet 1 (46 bytes) for connection 60509e83ec27671870be1c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:50 client Short Header{DestConnectionID: 0000000000001003ec6804619a0ea3d848381c42, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 95.069µs} 2025/04/30 10:09:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:50 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:50 client newly acked packets (1): [0] 2025/04/30 10:09:50 client updated RTT: 34.123ms (σ: 12.926ms) 2025/04/30 10:09:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:50 client -> Sending packet 2 (42 bytes) for connection 60509e83ec27671870be1c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:50 client Short Header{DestConnectionID: 0000000000001003ec6804619a0ea3d848381c42, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:50 client Connection 60509e83ec27671870be1c closed. 2025/04/30 10:09:50 Requesting https://server4:443/xryadiekkm. 2025/04/30 10:09:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:50 Increased send buffer size to 14336 kiB 2025/04/30 10:09:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:50 Created qlog file: /logs/qlog/16bab9bdcb4344f4fa9060674b8b14ac590aac.sqlog 2025/04/30 10:09:50 client Starting new connection to server4 ([::]:36848 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 16bab9bdcb4344f4fa9060674b8b14ac590aac, version v1 2025/04/30 10:09:50 Adding connection ID (empty). 2025/04/30 10:09:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:50 client -> Sending packet 0 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:50 client -> Sending packet 1 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:50 client -> Sending packet 2 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:50 client -> Sending packet 3 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:50 client -> Sending packet 4 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:50 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:09:51 client -> Sending packet 5 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:51 client -> Sending packet 6 (1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 1: 150 bytes. Remaining: 1050 bytes. 2025/04/30 10:09:51 client <- Reading packet 3 (150 bytes) for connection (empty), Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003f62d9751792d33bceb832a4a, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 120, Version: v1} 2025/04/30 10:09:51 client Received first packet. Switching destination connection ID to: 0000000000001003f62d9751792d33bceb832a4a 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 2: 1050 bytes. Remaining: 0 bytes. 2025/04/30 10:09:51 client <- Reading packet 3 (1050 bytes) for connection (empty), Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003f62d9751792d33bceb832a4a, PacketNumber: 3, PacketNumberLen: 1, Length: 1021, Version: v1} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:09:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 16bab9bdcb4344f4fa9060674b8b14ac590aac, InitialSourceConnectionID: 0000000000001003f62d9751792d33bceb832a4a, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfe719e51cca9ce67933d9392937180e4} 2025/04/30 10:09:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 0000000000001003f62d9751792d33bceb832a4a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003f62d9751792d33bceb832a4a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:51 client Dropping Initial keys. 2025/04/30 10:09:51 client -> Sending packet 1 (52 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003f62d9751792d33bceb832a4a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:51 client -> Sending packet 0 (58 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003f62d9751792d33bceb832a4a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 1: 150 bytes. Remaining: 1050 bytes. 2025/04/30 10:09:51 client Dropping %!s(logging.PacketType=0) packet (150 bytes) because we already dropped the keys. 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 2: 1050 bytes. Remaining: 0 bytes. 2025/04/30 10:09:51 client <- Reading packet 4 (1050 bytes) for connection (empty), Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003f62d9751792d33bceb832a4a, PacketNumber: 4, PacketNumberLen: 1, Length: 1021, Version: v1} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:09:51 client -> Sending packet 2 (52 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003f62d9751792d33bceb832a4a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:51 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:51 client Dropping Handshake keys. 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003d6ae10c47b01d174a3c14859, StatelessResetToken: 0xf34a6a07d45a3cd4eb3912aac10d4afd} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003f1013b87ba03ba50a84532b8, StatelessResetToken: 0x860a0a68ca3180db5461baaefa3c66da} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100300f7a7fb1a0ed8ae6567590d, StatelessResetToken: 0x42ebcbc46fc9c099105372f029cfd4ba} 2025/04/30 10:09:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:51 client -> Sending packet 1 (1366 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003d6ae10c47b01d174a3c14859, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.PingFrame{} 2025/04/30 10:09:51 client -> Sending packet 2 (46 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003d6ae10c47b01d174a3c14859, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 114.786µs} 2025/04/30 10:09:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:51 client <- Reading packet 1 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [2] 2025/04/30 10:09:51 client updated RTT: 32.132457ms (σ: 16.066228ms) 2025/04/30 10:09:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:51 client lost packet 0 (time threshold) 2025/04/30 10:09:51 client setting loss timer for packet 1 (1-RTT) to 36.149014ms (in 2025-04-30 10:09:51.641172151 +0000 UTC m=+14.671632325) 2025/04/30 10:09:51 client Canceling loss detection timer. 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003e9fc9d25aa0f11ce6c9ed8e3, StatelessResetToken: 0x4063fe08974de1c797303c3c6f7a124c} 2025/04/30 10:09:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:51 client Ignoring all packets below 1. 2025/04/30 10:09:51 client -> Sending packet 3 (63 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003d6ae10c47b01d174a3c14859, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 154.621µs} 2025/04/30 10:09:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:51 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:09:51.641172151 +0000 UTC m=+14.671632325 2025/04/30 10:09:51 client lost packet 1 (time threshold) 2025/04/30 10:09:51 client <- Reading packet 2 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [3] 2025/04/30 10:09:51 client updated RTT: 32.184ms (σ: 12.154ms) 2025/04/30 10:09:51 client Canceling loss detection timer. 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:51 client Ignoring all packets below 2. 2025/04/30 10:09:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:51 client -> Sending packet 4 (42 bytes) for connection 16bab9bdcb4344f4fa9060674b8b14ac590aac, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003d6ae10c47b01d174a3c14859, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:51 client Connection 16bab9bdcb4344f4fa9060674b8b14ac590aac closed. 2025/04/30 10:09:51 Requesting https://server4:443/xffshxchvt. 2025/04/30 10:09:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:51 Increased send buffer size to 14336 kiB 2025/04/30 10:09:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:51 Created qlog file: /logs/qlog/d6db47114bdafe5daa284d.sqlog 2025/04/30 10:09:51 client Starting new connection to server4 ([::]:38046 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d6db47114bdafe5daa284d, version v1 2025/04/30 10:09:51 Adding connection ID (empty). 2025/04/30 10:09:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:51 client -> Sending packet 0 (1280 bytes) for connection d6db47114bdafe5daa284d, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: d6db47114bdafe5daa284d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003278688042a9af9ec4ed79e83, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:51 client Received first packet. Switching destination connection ID to: 0000000000001003278688042a9af9ec4ed79e83 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.96949ms (σ: 16.984745ms) 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003278688042a9af9ec4ed79e83, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:09:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d6db47114bdafe5daa284d, InitialSourceConnectionID: 0000000000001003278688042a9af9ec4ed79e83, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfe57769ae0fc3380d2da3b180bb3d8b5} 2025/04/30 10:09:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d6db47114bdafe5daa284d 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 0000000000001003278688042a9af9ec4ed79e83, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003278688042a9af9ec4ed79e83, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:51 client Dropping Initial keys. 2025/04/30 10:09:51 client -> Sending packet 1 (110 bytes) for connection d6db47114bdafe5daa284d, Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003278688042a9af9ec4ed79e83, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003278688042a9af9ec4ed79e83, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:51 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:51 client Dropping Handshake keys. 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003a37d54e0152264a466e92281, StatelessResetToken: 0x49ce85ac9c5db201297b57ca5386d949} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100306b37282ecdead070730d20f, StatelessResetToken: 0x72f05065ca0906fa73ff2ccda95ea03f} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003c260a95969dba9b7b63d948b, StatelessResetToken: 0xb13e1dce0113de5593ac60cf1e732cea} 2025/04/30 10:09:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:51 client -> Sending packet 1 (46 bytes) for connection d6db47114bdafe5daa284d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003a37d54e0152264a466e92281, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 122.39µs} 2025/04/30 10:09:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:51 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.908ms (σ: 12.859ms) 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:51 client -> Sending packet 2 (42 bytes) for connection d6db47114bdafe5daa284d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003a37d54e0152264a466e92281, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:51 client Connection d6db47114bdafe5daa284d closed. 2025/04/30 10:09:51 Requesting https://server4:443/ekthrdwztr. 2025/04/30 10:09:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:51 Increased send buffer size to 14336 kiB 2025/04/30 10:09:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:51 Created qlog file: /logs/qlog/d2670ec80b5aa8eac3a0342d.sqlog 2025/04/30 10:09:51 client Starting new connection to server4 ([::]:55481 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d2670ec80b5aa8eac3a0342d, version v1 2025/04/30 10:09:51 Adding connection ID (empty). 2025/04/30 10:09:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:51 client -> Sending packet 0 (1280 bytes) for connection d2670ec80b5aa8eac3a0342d, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: d2670ec80b5aa8eac3a0342d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:51 client Received first packet. Switching destination connection ID to: 00000000000010034cb3f291acd4e8f34975dfc3 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.921485ms (σ: 16.960742ms) 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d2670ec80b5aa8eac3a0342d, InitialSourceConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x34ee711ad5468c56ed96e1ede48b0bac} 2025/04/30 10:09:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d2670ec80b5aa8eac3a0342d 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:51 client Dropping Initial keys. 2025/04/30 10:09:51 client -> Sending packet 1 (52 bytes) for connection d2670ec80b5aa8eac3a0342d, Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client -> Sending packet 0 (58 bytes) for connection d2670ec80b5aa8eac3a0342d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 00000000000010034cb3f291acd4e8f34975dfc3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:51 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:51 client Dropping Handshake keys. 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003a57bbbdbff491c2f9b5dde70, StatelessResetToken: 0xf2f84fa387f35a300b3349784a337cdc} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010039b096049a170338da129ac82, StatelessResetToken: 0x7d85c3ad5e2f6fe54cc9a1b5a916ea12} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003230570b19844dc8802e63453, StatelessResetToken: 0xc3bdec4ee1277738217808941d230ddb} 2025/04/30 10:09:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:51 client -> Sending packet 1 (46 bytes) for connection d2670ec80b5aa8eac3a0342d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003a57bbbdbff491c2f9b5dde70, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 126.217µs} 2025/04/30 10:09:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:51 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.892ms (σ: 12.777ms) 2025/04/30 10:09:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:51 client -> Sending packet 2 (42 bytes) for connection d2670ec80b5aa8eac3a0342d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003a57bbbdbff491c2f9b5dde70, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:51 client Connection d2670ec80b5aa8eac3a0342d closed. 2025/04/30 10:09:51 Requesting https://server4:443/khirervgia. 2025/04/30 10:09:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:51 Increased send buffer size to 14336 kiB 2025/04/30 10:09:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:51 Created qlog file: /logs/qlog/1aaf524c680b66e125e54d.sqlog 2025/04/30 10:09:51 client Starting new connection to server4 ([::]:41708 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1aaf524c680b66e125e54d, version v1 2025/04/30 10:09:51 Adding connection ID (empty). 2025/04/30 10:09:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:51 client -> Sending packet 0 (1280 bytes) for connection 1aaf524c680b66e125e54d, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 1aaf524c680b66e125e54d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010036c851101c62991d62cc800e0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:51 client Received first packet. Switching destination connection ID to: 00000000000010036c851101c62991d62cc800e0 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.943791ms (σ: 16.971895ms) 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010036c851101c62991d62cc800e0, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1aaf524c680b66e125e54d, InitialSourceConnectionID: 00000000000010036c851101c62991d62cc800e0, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xf276b6cc6cf3dd075d7803093ab4f212} 2025/04/30 10:09:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1aaf524c680b66e125e54d 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 00000000000010036c851101c62991d62cc800e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036c851101c62991d62cc800e0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:51 client Dropping Initial keys. 2025/04/30 10:09:51 client -> Sending packet 1 (110 bytes) for connection 1aaf524c680b66e125e54d, Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036c851101c62991d62cc800e0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Short Header{DestConnectionID: 00000000000010036c851101c62991d62cc800e0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:51 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:51 client Dropping Handshake keys. 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003dac233964c8919fd2450aca5, StatelessResetToken: 0x9d97efe6668771927119a4f815f55b42} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003a23fcf9a05445bd38230b71c, StatelessResetToken: 0x711bec82b00a5d664f4ec8c7693b8e03} 2025/04/30 10:09:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010030f9af5d4561f07bb9b9660cf, StatelessResetToken: 0x3303d05d6332c5a59b3fbee34f849e6f} 2025/04/30 10:09:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:51 client -> Sending packet 1 (46 bytes) for connection 1aaf524c680b66e125e54d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003dac233964c8919fd2450aca5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 92.514µs} 2025/04/30 10:09:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:51 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.929ms (σ: 12.756ms) 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:51 client -> Sending packet 2 (42 bytes) for connection 1aaf524c680b66e125e54d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 0000000000001003dac233964c8919fd2450aca5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:51 client Connection 1aaf524c680b66e125e54d closed. 2025/04/30 10:09:51 Requesting https://server4:443/yddepyndcr. 2025/04/30 10:09:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:51 Increased send buffer size to 14336 kiB 2025/04/30 10:09:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:51 Created qlog file: /logs/qlog/11c83fe157ccfb8c498e0cfe080cd253.sqlog 2025/04/30 10:09:51 client Starting new connection to server4 ([::]:53241 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 11c83fe157ccfb8c498e0cfe080cd253, version v1 2025/04/30 10:09:51 Adding connection ID (empty). 2025/04/30 10:09:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:51 client -> Sending packet 0 (1280 bytes) for connection 11c83fe157ccfb8c498e0cfe080cd253, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 11c83fe157ccfb8c498e0cfe080cd253, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:51 client Received first packet. Switching destination connection ID to: 000000000000100352f6b2b7a58f62d8250e42da 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.861932ms (σ: 16.930966ms) 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:51 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:09:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 11c83fe157ccfb8c498e0cfe080cd253, InitialSourceConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x470c4984f91f2e8bdb236d7ebe60931b} 2025/04/30 10:09:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 11c83fe157ccfb8c498e0cfe080cd253 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:51 client Dropping Initial keys. 2025/04/30 10:09:51 client -> Sending packet 1 (52 bytes) for connection 11c83fe157ccfb8c498e0cfe080cd253, Handshake 2025/04/30 10:09:51 client Long Header{Type: Handshake, DestConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client -> Sending packet 0 (58 bytes) for connection 11c83fe157ccfb8c498e0cfe080cd253, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:51 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:51 client Peer doesn't await address validation any longer. 2025/04/30 10:09:51 client newly acked packets (1): [0] 2025/04/30 10:09:51 client updated RTT: 33.835ms (σ: 12.747ms) 2025/04/30 10:09:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:51 client Canceling loss detection timer. 2025/04/30 10:09:51 client Dropping Handshake keys. 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:51 client -> Sending packet 1 (44 bytes) for connection 11c83fe157ccfb8c498e0cfe080cd253, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 99.878µs} 2025/04/30 10:09:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:51 client -> Sending packet 2 (42 bytes) for connection 11c83fe157ccfb8c498e0cfe080cd253, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:51 client Short Header{DestConnectionID: 000000000000100352f6b2b7a58f62d8250e42da, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:51 client Connection 11c83fe157ccfb8c498e0cfe080cd253 closed. 2025/04/30 10:09:51 Requesting https://server4:443/abfnunotxu. 2025/04/30 10:09:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:51 Increased send buffer size to 14336 kiB 2025/04/30 10:09:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:51 Created qlog file: /logs/qlog/016c2bd106568555df44ce3ac95ed39317.sqlog 2025/04/30 10:09:51 client Starting new connection to server4 ([::]:38734 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 016c2bd106568555df44ce3ac95ed39317, version v1 2025/04/30 10:09:51 Adding connection ID (empty). 2025/04/30 10:09:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:51 client -> Sending packet 0 (1280 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, Initial 2025/04/30 10:09:51 client Long Header{Type: Initial, DestConnectionID: 016c2bd106568555df44ce3ac95ed39317, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:09:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:52 client -> Sending packet 1 (1280 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 016c2bd106568555df44ce3ac95ed39317, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:52 client -> Sending packet 2 (1280 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 016c2bd106568555df44ce3ac95ed39317, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:52 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:52 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003ae2be00a5456f464fafd5906, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:52 client Received first packet. Switching destination connection ID to: 0000000000001003ae2be00a5456f464fafd5906 2025/04/30 10:09:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:52 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003ae2be00a5456f464fafd5906, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:09:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 016c2bd106568555df44ce3ac95ed39317, InitialSourceConnectionID: 0000000000001003ae2be00a5456f464fafd5906, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8f7db6775bd394354af2278c0533b587} 2025/04/30 10:09:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 016c2bd106568555df44ce3ac95ed39317 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 0000000000001003ae2be00a5456f464fafd5906, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003ae2be00a5456f464fafd5906, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:52 client Dropping Initial keys. 2025/04/30 10:09:52 client -> Sending packet 1 (110 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003ae2be00a5456f464fafd5906, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:52 client Short Header{DestConnectionID: 0000000000001003ae2be00a5456f464fafd5906, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:52 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:52 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:52 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:52 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003ae2be00a5456f464fafd5906, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:09:52 client -> Sending packet 2 (52 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003ae2be00a5456f464fafd5906, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:52 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:52 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:52 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:52 client Dropping Handshake keys. 2025/04/30 10:09:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100385a20d072ed74078ed0f5cb5, StatelessResetToken: 0xf6c4ac7e7e1f8f128adffaaed3792d46} 2025/04/30 10:09:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100343649ca47bf17a244a6ba770, StatelessResetToken: 0x5fdf0dcc6044162e8d741cceb8217386} 2025/04/30 10:09:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003849f93000cf1276bc47a0919, StatelessResetToken: 0xaa3647c3f822c8cac0c1b80d5274c6d0} 2025/04/30 10:09:52 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:52 client -> Sending packet 1 (1366 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:52 client Short Header{DestConnectionID: 000000000000100385a20d072ed74078ed0f5cb5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:52 client -> &wire.PingFrame{} 2025/04/30 10:09:52 client -> Sending packet 2 (46 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:52 client Short Header{DestConnectionID: 000000000000100385a20d072ed74078ed0f5cb5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 209.394µs} 2025/04/30 10:09:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:52 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:52 client newly acked packets (1): [0] 2025/04/30 10:09:52 client updated RTT: 33.892939ms (σ: 16.946469ms) 2025/04/30 10:09:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:52 client -> Sending packet 3 (42 bytes) for connection 016c2bd106568555df44ce3ac95ed39317, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:52 client Short Header{DestConnectionID: 000000000000100385a20d072ed74078ed0f5cb5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:52 client Connection 016c2bd106568555df44ce3ac95ed39317 closed. 2025/04/30 10:09:52 Requesting https://server4:443/haedtmtylx. 2025/04/30 10:09:52 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:52 Increased send buffer size to 14336 kiB 2025/04/30 10:09:52 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:52 Created qlog file: /logs/qlog/50b2e3bfe06ceb7950.sqlog 2025/04/30 10:09:52 client Starting new connection to server4 ([::]:52318 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 50b2e3bfe06ceb7950, version v1 2025/04/30 10:09:52 Adding connection ID (empty). 2025/04/30 10:09:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:52 client -> Sending packet 0 (1280 bytes) for connection 50b2e3bfe06ceb7950, Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 50b2e3bfe06ceb7950, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:09:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:52 client -> Sending packet 1 (1280 bytes) for connection 50b2e3bfe06ceb7950, Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 50b2e3bfe06ceb7950, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:09:52 client -> Sending packet 2 (1280 bytes) for connection 50b2e3bfe06ceb7950, Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 50b2e3bfe06ceb7950, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:09:52 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:52 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:52 client Received first packet. Switching destination connection ID to: 0000000000001003aa8f29969e6759d896e1ace3 2025/04/30 10:09:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:52 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 10:09:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 50b2e3bfe06ceb7950, InitialSourceConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x05e2fbbec44347caa1ac9a37ec42bbe0} 2025/04/30 10:09:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 50b2e3bfe06ceb7950 2025/04/30 10:09:52 client Long Header{Type: Initial, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:52 client Dropping Initial keys. 2025/04/30 10:09:52 client -> Sending packet 1 (52 bytes) for connection 50b2e3bfe06ceb7950, Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:52 client -> Sending packet 0 (58 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:52 client Short Header{DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:52 client -> Sending packet 2 (86 bytes) for connection 50b2e3bfe06ceb7950, Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:52 client -> Sending packet 3 (86 bytes) for connection 50b2e3bfe06ceb7950, Handshake 2025/04/30 10:09:52 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:09:53 client -> Sending packet 4 (86 bytes) for connection 50b2e3bfe06ceb7950, Handshake 2025/04/30 10:09:53 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:53 client -> Sending packet 5 (86 bytes) for connection 50b2e3bfe06ceb7950, Handshake 2025/04/30 10:09:53 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003aa8f29969e6759d896e1ace3, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:53 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:53 client Dropping Handshake keys. 2025/04/30 10:09:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, StatelessResetToken: 0xbbd7f2aab1376b6fd9b427848d8f4cdf} 2025/04/30 10:09:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010033ec19a4b6de3bcfeb2681279, StatelessResetToken: 0xdd836ba526d58b7404c6398adfc1492b} 2025/04/30 10:09:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003afddd92b844ef56ade747984, StatelessResetToken: 0x7806e4107aa0f87fa824e8737a7bcc42} 2025/04/30 10:09:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:53 client -> Sending packet 2 (65 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.337µs} 2025/04/30 10:09:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:53 client -> Sending packet 3 (60 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:53 client -> Sending packet 4 (1366 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.PingFrame{} 2025/04/30 10:09:53 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:53 client <- &wire.PingFrame{} 2025/04/30 10:09:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:53 client -> Sending packet 5 (46 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 101.31µs} 2025/04/30 10:09:53 client <- Reading packet 6 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:53 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:53 client <- &wire.PingFrame{} 2025/04/30 10:09:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:53 client -> Sending packet 6 (48 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 101.531µs} 2025/04/30 10:09:53 client <- Reading packet 7 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:53 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:53 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:53 client newly acked packets (2): [3 4] 2025/04/30 10:09:53 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:53 client Canceling loss detection timer. 2025/04/30 10:09:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010034c98dd7a4ded1d4f0e9bcd1d, StatelessResetToken: 0xddf6ab45437cd992f719075692ab164f} 2025/04/30 10:09:53 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:53 client -> Sending packet 7 (1409 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.PingFrame{} 2025/04/30 10:09:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:53 client -> Sending packet 8 (42 bytes) for connection 50b2e3bfe06ceb7950, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:53 client Short Header{DestConnectionID: 00000000000010039c19ce705a17c5bc6dbb0a1f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:53 client Connection 50b2e3bfe06ceb7950 closed. 2025/04/30 10:09:53 Requesting https://server4:443/kushhcgxsf. 2025/04/30 10:09:53 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:53 Increased send buffer size to 14336 kiB 2025/04/30 10:09:53 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:53 Created qlog file: /logs/qlog/a9198d3e5d2c2d7acb23ae53.sqlog 2025/04/30 10:09:53 client Starting new connection to server4 ([::]:51395 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9198d3e5d2c2d7acb23ae53, version v1 2025/04/30 10:09:53 Adding connection ID (empty). 2025/04/30 10:09:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:53 client -> Sending packet 0 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:53 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:53 client -> Sending packet 1 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:53 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:53 client -> Sending packet 2 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:53 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:53 client -> Sending packet 3 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:53 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:53 client -> Sending packet 4 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:53 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:09:54 client -> Sending packet 5 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:54 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:54 client -> Sending packet 6 (1280 bytes) for connection a9198d3e5d2c2d7acb23ae53, Initial 2025/04/30 10:09:54 client Long Header{Type: Initial, DestConnectionID: a9198d3e5d2c2d7acb23ae53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:54 client Parsed a coalesced packet. Part 1: 150 bytes. Remaining: 1050 bytes. 2025/04/30 10:09:54 client <- Reading packet 3 (150 bytes) for connection (empty), Initial 2025/04/30 10:09:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100313f266eef6ed33f58195eb4b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 120, Version: v1} 2025/04/30 10:09:54 client Received first packet. Switching destination connection ID to: 000000000000100313f266eef6ed33f58195eb4b 2025/04/30 10:09:54 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:09:54 client newly acked packets (1): [6] 2025/04/30 10:09:54 client updated RTT: 34.113902ms (σ: 17.056951ms) 2025/04/30 10:09:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:54 client Parsed a coalesced packet. Part 2: 1050 bytes. Remaining: 0 bytes. 2025/04/30 10:09:54 client <- Reading packet 3 (1050 bytes) for connection (empty), Handshake 2025/04/30 10:09:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100313f266eef6ed33f58195eb4b, PacketNumber: 3, PacketNumberLen: 1, Length: 1021, Version: v1} 2025/04/30 10:09:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:09:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9198d3e5d2c2d7acb23ae53, InitialSourceConnectionID: 000000000000100313f266eef6ed33f58195eb4b, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xc6d823f53b07728d7653abe8baab047a} 2025/04/30 10:09:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a9198d3e5d2c2d7acb23ae53 2025/04/30 10:09:54 client Long Header{Type: Initial, DestConnectionID: 000000000000100313f266eef6ed33f58195eb4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:54 client Long Header{Type: Handshake, DestConnectionID: 000000000000100313f266eef6ed33f58195eb4b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:54 client Dropping Initial keys. 2025/04/30 10:09:54 client -> Sending packet 1 (52 bytes) for connection a9198d3e5d2c2d7acb23ae53, Handshake 2025/04/30 10:09:54 client Long Header{Type: Handshake, DestConnectionID: 000000000000100313f266eef6ed33f58195eb4b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:54 client -> Sending packet 0 (58 bytes) for connection a9198d3e5d2c2d7acb23ae53, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:54 client Short Header{DestConnectionID: 000000000000100313f266eef6ed33f58195eb4b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:54 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:54 client -> Sending packet 2 (86 bytes) for connection a9198d3e5d2c2d7acb23ae53, Handshake 2025/04/30 10:09:54 client Long Header{Type: Handshake, DestConnectionID: 000000000000100313f266eef6ed33f58195eb4b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:54 client -> Sending packet 3 (86 bytes) for connection a9198d3e5d2c2d7acb23ae53, Handshake 2025/04/30 10:09:54 client Long Header{Type: Handshake, DestConnectionID: 000000000000100313f266eef6ed33f58195eb4b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:54 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:54 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:54 client Dropping Handshake keys. 2025/04/30 10:09:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100374ee1011c89ea499864cccf4, StatelessResetToken: 0xf11b49cf95434c5975c65a6d1745e882} 2025/04/30 10:09:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003fd9befc80d6a3e47b85877c8, StatelessResetToken: 0x4843b795a51bd811718d9a5761560d05} 2025/04/30 10:09:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003de60f6b79bc8aeae7964dd52, StatelessResetToken: 0x00f1067a3611a46400fdc43984c276c3} 2025/04/30 10:09:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:54 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:54 client -> Sending packet 2 (65 bytes) for connection a9198d3e5d2c2d7acb23ae53, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:54 client Short Header{DestConnectionID: 000000000000100374ee1011c89ea499864cccf4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.424µs} 2025/04/30 10:09:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:54 client -> Sending packet 3 (60 bytes) for connection a9198d3e5d2c2d7acb23ae53, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:54 client Short Header{DestConnectionID: 000000000000100374ee1011c89ea499864cccf4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:54 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:54 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003c6946e059d01717279e859d4, StatelessResetToken: 0x1957cfa4be33bf8e2df336b065a3b88c} 2025/04/30 10:09:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:54 client -> Sending packet 4 (42 bytes) for connection a9198d3e5d2c2d7acb23ae53, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:54 client Short Header{DestConnectionID: 000000000000100374ee1011c89ea499864cccf4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:54 client Connection a9198d3e5d2c2d7acb23ae53 closed. 2025/04/30 10:09:54 Requesting https://server4:443/jpxgudmmkv. 2025/04/30 10:09:54 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:54 Increased send buffer size to 14336 kiB 2025/04/30 10:09:54 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:54 Created qlog file: /logs/qlog/4f2c786d3956f7e5f9f87300.sqlog 2025/04/30 10:09:54 client Starting new connection to server4 ([::]:52756 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4f2c786d3956f7e5f9f87300, version v1 2025/04/30 10:09:54 Adding connection ID (empty). 2025/04/30 10:09:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:54 client -> Sending packet 0 (1280 bytes) for connection 4f2c786d3956f7e5f9f87300, Initial 2025/04/30 10:09:54 client Long Header{Type: Initial, DestConnectionID: 4f2c786d3956f7e5f9f87300, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:55 client -> Sending packet 1 (1280 bytes) for connection 4f2c786d3956f7e5f9f87300, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: 4f2c786d3956f7e5f9f87300, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:55 client -> Sending packet 2 (1280 bytes) for connection 4f2c786d3956f7e5f9f87300, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: 4f2c786d3956f7e5f9f87300, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:55 client -> Sending packet 3 (1280 bytes) for connection 4f2c786d3956f7e5f9f87300, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: 4f2c786d3956f7e5f9f87300, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:55 client -> Sending packet 4 (1280 bytes) for connection 4f2c786d3956f7e5f9f87300, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: 4f2c786d3956f7e5f9f87300, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:55 client <- Reading packet 2 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:55 client Received first packet. Switching destination connection ID to: 0000000000001003527b982b8c1b25007b77e8cf 2025/04/30 10:09:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:55 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:09:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4f2c786d3956f7e5f9f87300, InitialSourceConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x636f4809de8d6bebfcd54cd9d35568f1} 2025/04/30 10:09:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f2c786d3956f7e5f9f87300 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:55 client Dropping Initial keys. 2025/04/30 10:09:55 client -> Sending packet 1 (52 bytes) for connection 4f2c786d3956f7e5f9f87300, Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:55 client -> Sending packet 0 (58 bytes) for connection 4f2c786d3956f7e5f9f87300, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:55 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:55 client <- Reading packet 3 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, PacketNumber: 3, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:09:55 client -> Sending packet 2 (52 bytes) for connection 4f2c786d3956f7e5f9f87300, Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003527b982b8c1b25007b77e8cf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:55 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:55 client Dropping Handshake keys. 2025/04/30 10:09:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003032587378c52fbc088bb31e8, StatelessResetToken: 0xb78c6d1e4d5ecc1073faac8d97263922} 2025/04/30 10:09:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100321f8f369e78ca356ff82d884, StatelessResetToken: 0x5940c0e06b7257ae0c4b67841cda1042} 2025/04/30 10:09:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003be71a3ebf3eb14c4483235b7, StatelessResetToken: 0x97347bd0e3de307177da0a9304f764ad} 2025/04/30 10:09:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:55 client -> Sending packet 1 (1366 bytes) for connection 4f2c786d3956f7e5f9f87300, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003032587378c52fbc088bb31e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.PingFrame{} 2025/04/30 10:09:55 client -> Sending packet 2 (46 bytes) for connection 4f2c786d3956f7e5f9f87300, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003032587378c52fbc088bb31e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 133.211µs} 2025/04/30 10:09:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:55 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:55 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:55 client newly acked packets (1): [0] 2025/04/30 10:09:55 client updated RTT: 33.528637ms (σ: 16.764318ms) 2025/04/30 10:09:55 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:55 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:55 client -> Sending packet 3 (42 bytes) for connection 4f2c786d3956f7e5f9f87300, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003032587378c52fbc088bb31e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:55 client Connection 4f2c786d3956f7e5f9f87300 closed. 2025/04/30 10:09:55 Requesting https://server4:443/nyaxqhtyej. 2025/04/30 10:09:55 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:55 Increased send buffer size to 14336 kiB 2025/04/30 10:09:55 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:55 Created qlog file: /logs/qlog/e061f0caa0dd32588ce2d8d1.sqlog 2025/04/30 10:09:55 client Starting new connection to server4 ([::]:50621 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e061f0caa0dd32588ce2d8d1, version v1 2025/04/30 10:09:55 Adding connection ID (empty). 2025/04/30 10:09:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:55 client -> Sending packet 0 (1280 bytes) for connection e061f0caa0dd32588ce2d8d1, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: e061f0caa0dd32588ce2d8d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:55 client -> Sending packet 1 (1280 bytes) for connection e061f0caa0dd32588ce2d8d1, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: e061f0caa0dd32588ce2d8d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:55 client -> Sending packet 2 (1280 bytes) for connection e061f0caa0dd32588ce2d8d1, Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: e061f0caa0dd32588ce2d8d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:55 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010032cafb367ea15c7c44941723f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:55 client Received first packet. Switching destination connection ID to: 00000000000010032cafb367ea15c7c44941723f 2025/04/30 10:09:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:55 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010032cafb367ea15c7c44941723f, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:09:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e061f0caa0dd32588ce2d8d1, InitialSourceConnectionID: 00000000000010032cafb367ea15c7c44941723f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3c0b06a94a5036474fa55c0b0cfb0fb7} 2025/04/30 10:09:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e061f0caa0dd32588ce2d8d1 2025/04/30 10:09:55 client Long Header{Type: Initial, DestConnectionID: 00000000000010032cafb367ea15c7c44941723f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: 00000000000010032cafb367ea15c7c44941723f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:55 client Dropping Initial keys. 2025/04/30 10:09:55 client -> Sending packet 1 (110 bytes) for connection e061f0caa0dd32588ce2d8d1, Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: 00000000000010032cafb367ea15c7c44941723f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:55 client Short Header{DestConnectionID: 00000000000010032cafb367ea15c7c44941723f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:55 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:55 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:55 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010032cafb367ea15c7c44941723f, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:09:55 client -> Sending packet 2 (52 bytes) for connection e061f0caa0dd32588ce2d8d1, Handshake 2025/04/30 10:09:55 client Long Header{Type: Handshake, DestConnectionID: 00000000000010032cafb367ea15c7c44941723f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:55 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:55 client Dropping Handshake keys. 2025/04/30 10:09:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003b0ea49b22aff07edd568e711, StatelessResetToken: 0x9503691d60384ddb2daef9627d34642e} 2025/04/30 10:09:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010034fe72f950ee0b1509c44f678, StatelessResetToken: 0x2c657350eee22252584ee231b83ee730} 2025/04/30 10:09:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010031379ea49fec9cf1a85fd0258, StatelessResetToken: 0xf40e9d3abd08f0ce6454f44acd589db4} 2025/04/30 10:09:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:55 client -> Sending packet 1 (1366 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.PingFrame{} 2025/04/30 10:09:55 client -> Sending packet 2 (46 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 113.664µs} 2025/04/30 10:09:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:55 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:55 client <- &wire.PingFrame{} 2025/04/30 10:09:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:55 client -> Sending packet 3 (46 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:55 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 81.624µs} 2025/04/30 10:09:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:56 client -> Sending packet 5 (58 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 client Skipping packet number 4 2025/04/30 10:09:56 client -> Sending packet 6 (41 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:56 client <- Reading packet 3 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.PingFrame{} 2025/04/30 10:09:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:56 client <- Reading packet 4 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.PingFrame{} 2025/04/30 10:09:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:09:56 client -> Sending packet 7 (46 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 78.097µs} 2025/04/30 10:09:56 client <- Reading packet 5 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.PingFrame{} 2025/04/30 10:09:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:56 client <- Reading packet 6 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:56 client newly acked packets (1): [5] 2025/04/30 10:09:56 client updated RTT: 32.190736ms (σ: 16.095368ms) 2025/04/30 10:09:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:56 client lost packet 1 (time threshold) 2025/04/30 10:09:56 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:09:56 client -> Sending packet 8 (1323 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.PingFrame{} 2025/04/30 10:09:56 client -> Sending packet 9 (46 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 169.91µs} 2025/04/30 10:09:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:56 client -> Sending packet 10 (42 bytes) for connection e061f0caa0dd32588ce2d8d1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003b0ea49b22aff07edd568e711, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:56 client Connection e061f0caa0dd32588ce2d8d1 closed. 2025/04/30 10:09:56 Requesting https://server4:443/hilnxdfsee. 2025/04/30 10:09:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:56 Increased send buffer size to 14336 kiB 2025/04/30 10:09:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:56 Created qlog file: /logs/qlog/cbc04e10cd46f39dd6b3940275f8.sqlog 2025/04/30 10:09:56 client Starting new connection to server4 ([::]:34620 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cbc04e10cd46f39dd6b3940275f8, version v1 2025/04/30 10:09:56 Adding connection ID (empty). 2025/04/30 10:09:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:56 client -> Sending packet 0 (1280 bytes) for connection cbc04e10cd46f39dd6b3940275f8, Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: cbc04e10cd46f39dd6b3940275f8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:56 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100317611221af8eecc323710ab9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:56 client Received first packet. Switching destination connection ID to: 000000000000100317611221af8eecc323710ab9 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client newly acked packets (1): [0] 2025/04/30 10:09:56 client updated RTT: 34.228226ms (σ: 17.114113ms) 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:56 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100317611221af8eecc323710ab9, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 10:09:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cbc04e10cd46f39dd6b3940275f8, InitialSourceConnectionID: 000000000000100317611221af8eecc323710ab9, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x977d331147d592b3a9cdd490017a2153} 2025/04/30 10:09:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cbc04e10cd46f39dd6b3940275f8 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: 000000000000100317611221af8eecc323710ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 000000000000100317611221af8eecc323710ab9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client Dropping Initial keys. 2025/04/30 10:09:56 client -> Sending packet 1 (52 bytes) for connection cbc04e10cd46f39dd6b3940275f8, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 000000000000100317611221af8eecc323710ab9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client -> Sending packet 0 (58 bytes) for connection cbc04e10cd46f39dd6b3940275f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 000000000000100317611221af8eecc323710ab9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:56 client Dropping Handshake keys. 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003f48d790eb70ae06d677832b2, StatelessResetToken: 0x57bd9aca52daa8b4ba3299157c2a6b54} 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003e319788d43d64ba7716556fb, StatelessResetToken: 0x748352460e6ef0ebf41cc1f70daf6f41} 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100359a4c10f75874b034dc683d4, StatelessResetToken: 0x094b9f8fcc643f1e930f88c9cbd6bcc9} 2025/04/30 10:09:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:56 client -> Sending packet 1 (46 bytes) for connection cbc04e10cd46f39dd6b3940275f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003f48d790eb70ae06d677832b2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112.692µs} 2025/04/30 10:09:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:56 client <- Reading packet 1 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:56 client newly acked packets (1): [1] 2025/04/30 10:09:56 client updated RTT: 33.807ms (σ: 13.676ms) 2025/04/30 10:09:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:56 client lost packet 0 (time threshold) 2025/04/30 10:09:56 client Canceling loss detection timer. 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000100330de5a0aa6ecc21b63450531, StatelessResetToken: 0x6e73fb35f7c25f2691d68537d5b02293} 2025/04/30 10:09:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:56 client Ignoring all packets below 1. 2025/04/30 10:09:56 client -> Sending packet 2 (63 bytes) for connection cbc04e10cd46f39dd6b3940275f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003f48d790eb70ae06d677832b2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 116.079µs} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 client <- Reading packet 2 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:56 client newly acked packets (1): [2] 2025/04/30 10:09:56 client updated RTT: 33.6ms (σ: 10.669ms) 2025/04/30 10:09:56 client Canceling loss detection timer. 2025/04/30 10:09:56 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:56 client Ignoring all packets below 2. 2025/04/30 10:09:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:56 client -> Sending packet 3 (42 bytes) for connection cbc04e10cd46f39dd6b3940275f8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003f48d790eb70ae06d677832b2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:56 client Connection cbc04e10cd46f39dd6b3940275f8 closed. 2025/04/30 10:09:56 Requesting https://server4:443/nsmuhcpdfx. 2025/04/30 10:09:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:56 Increased send buffer size to 14336 kiB 2025/04/30 10:09:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:56 Created qlog file: /logs/qlog/29f57db792afda7c5ae65cb58c72.sqlog 2025/04/30 10:09:56 client Starting new connection to server4 ([::]:40269 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 29f57db792afda7c5ae65cb58c72, version v1 2025/04/30 10:09:56 Adding connection ID (empty). 2025/04/30 10:09:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:56 client -> Sending packet 0 (1280 bytes) for connection 29f57db792afda7c5ae65cb58c72, Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: 29f57db792afda7c5ae65cb58c72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:09:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:56 client -> Sending packet 1 (1280 bytes) for connection 29f57db792afda7c5ae65cb58c72, Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: 29f57db792afda7c5ae65cb58c72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:09:56 client -> Sending packet 2 (1280 bytes) for connection 29f57db792afda7c5ae65cb58c72, Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: 29f57db792afda7c5ae65cb58c72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:56 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:56 client Received first packet. Switching destination connection ID to: 0000000000001003c2e4789e2a1396c4d8c92b16 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:56 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 29f57db792afda7c5ae65cb58c72, InitialSourceConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x8db01c017b7331127dc3f14d8cb4149b} 2025/04/30 10:09:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 29f57db792afda7c5ae65cb58c72 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client Dropping Initial keys. 2025/04/30 10:09:56 client -> Sending packet 1 (110 bytes) for connection 29f57db792afda7c5ae65cb58c72, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:56 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:56 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:56 client -> Sending packet 2 (52 bytes) for connection 29f57db792afda7c5ae65cb58c72, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:56 client -> Sending packet 3 (86 bytes) for connection 29f57db792afda7c5ae65cb58c72, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client -> Sending packet 4 (86 bytes) for connection 29f57db792afda7c5ae65cb58c72, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003c2e4789e2a1396c4d8c92b16, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:56 client Dropping Handshake keys. 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003eb137be09ac1d95554e5721e, StatelessResetToken: 0xd375abd018dfbc2e794d0ebb5d05d739} 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003160869a73a25d186007d27bb, StatelessResetToken: 0x7334199c4da69b813c569f6e7bda659c} 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100382116e23e08c47e8f6006fb6, StatelessResetToken: 0x28323789613a602af0b20600aa98da46} 2025/04/30 10:09:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:56 client -> Sending packet 2 (65 bytes) for connection 29f57db792afda7c5ae65cb58c72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003eb137be09ac1d95554e5721e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 91.773µs} 2025/04/30 10:09:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 client -> Sending packet 3 (60 bytes) for connection 29f57db792afda7c5ae65cb58c72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003eb137be09ac1d95554e5721e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 client -> Sending packet 4 (1366 bytes) for connection 29f57db792afda7c5ae65cb58c72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003eb137be09ac1d95554e5721e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.PingFrame{} 2025/04/30 10:09:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:56 client <- Reading packet 1 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010031a62b3158ef322d6037b705b, StatelessResetToken: 0x6a09c0a5eaf2bb359719dcc3bb0c91f0} 2025/04/30 10:09:56 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:56 client -> Sending packet 5 (42 bytes) for connection 29f57db792afda7c5ae65cb58c72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 0000000000001003eb137be09ac1d95554e5721e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:56 client Connection 29f57db792afda7c5ae65cb58c72 closed. 2025/04/30 10:09:56 Requesting https://server4:443/ejexympfvh. 2025/04/30 10:09:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:56 Increased send buffer size to 14336 kiB 2025/04/30 10:09:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:56 Created qlog file: /logs/qlog/a6468b7661138b326b85b2.sqlog 2025/04/30 10:09:56 client Starting new connection to server4 ([::]:39306 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a6468b7661138b326b85b2, version v1 2025/04/30 10:09:56 Adding connection ID (empty). 2025/04/30 10:09:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:56 client -> Sending packet 0 (1280 bytes) for connection a6468b7661138b326b85b2, Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: a6468b7661138b326b85b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:56 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:56 client Received first packet. Switching destination connection ID to: 00000000000010036ee308d068b4bcae12dedcdd 2025/04/30 10:09:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client newly acked packets (1): [0] 2025/04/30 10:09:56 client updated RTT: 34.158137ms (σ: 17.079068ms) 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:56 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:09:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a6468b7661138b326b85b2, InitialSourceConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x08323941e8f4ca689ebe1c3d4bdf24f1} 2025/04/30 10:09:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a6468b7661138b326b85b2 2025/04/30 10:09:56 client Long Header{Type: Initial, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client Dropping Initial keys. 2025/04/30 10:09:56 client -> Sending packet 1 (52 bytes) for connection a6468b7661138b326b85b2, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:56 client -> Sending packet 0 (58 bytes) for connection a6468b7661138b326b85b2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:09:56 client -> Sending packet 2 (86 bytes) for connection a6468b7661138b326b85b2, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client -> Sending packet 3 (86 bytes) for connection a6468b7661138b326b85b2, Handshake 2025/04/30 10:09:56 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:56 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:56 client <- &wire.PingFrame{} 2025/04/30 10:09:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:56 client -> Sending packet 1 (44 bytes) for connection a6468b7661138b326b85b2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:56 client Short Header{DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 92.724µs} 2025/04/30 10:09:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:57 client <- Reading packet 2 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.PingFrame{} 2025/04/30 10:09:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:57 client Sending ACK because the ACK timer expired. 2025/04/30 10:09:57 client -> Sending packet 2 (45 bytes) for connection a6468b7661138b326b85b2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.320772ms} 2025/04/30 10:09:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:09:57 client -> Sending packet 4 (86 bytes) for connection a6468b7661138b326b85b2, Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:57 client -> Sending packet 5 (86 bytes) for connection a6468b7661138b326b85b2, Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036ee308d068b4bcae12dedcdd, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:57 client <- Reading packet 5 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:57 client Dropping Handshake keys. 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010034647a5238589d100855acf19, StatelessResetToken: 0x540b452811bf1768fb01134ce0acf4e9} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003bf0dad3e3ae55746be3440a3, StatelessResetToken: 0xc2255da1d725b947ac120c71a4b31872} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003afb6d0340fae07609e82f781, StatelessResetToken: 0x7bee896013784977caa84cfd7fd130bf} 2025/04/30 10:09:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:57 client -> Sending packet 4 (67 bytes) for connection a6468b7661138b326b85b2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 00000000000010034647a5238589d100855acf19, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 124.274µs} 2025/04/30 10:09:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:57 client -> Sending packet 5 (60 bytes) for connection a6468b7661138b326b85b2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 00000000000010034647a5238589d100855acf19, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:57 client <- Reading packet 6 (1099 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003c1da011cc083fe2bd01c3d8c, StatelessResetToken: 0xcaccb4c7cb5784f6f6dca53971e08049} 2025/04/30 10:09:57 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:57 client -> Sending packet 6 (42 bytes) for connection a6468b7661138b326b85b2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 00000000000010034647a5238589d100855acf19, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:57 client Connection a6468b7661138b326b85b2 closed. 2025/04/30 10:09:57 Requesting https://server4:443/hrchhixxtp. 2025/04/30 10:09:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:57 Increased send buffer size to 14336 kiB 2025/04/30 10:09:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:57 Created qlog file: /logs/qlog/3308483fe2179d2dc2.sqlog 2025/04/30 10:09:57 client Starting new connection to server4 ([::]:39456 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3308483fe2179d2dc2, version v1 2025/04/30 10:09:57 Adding connection ID (empty). 2025/04/30 10:09:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:57 client -> Sending packet 0 (1280 bytes) for connection 3308483fe2179d2dc2, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 3308483fe2179d2dc2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:57 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:57 client Received first packet. Switching destination connection ID to: 000000000000100399b70bb5b768c44ca5efbdaf 2025/04/30 10:09:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client newly acked packets (1): [0] 2025/04/30 10:09:57 client updated RTT: 33.97975ms (σ: 16.989875ms) 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:57 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 10:09:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3308483fe2179d2dc2, InitialSourceConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x36c3282215c30e8ebd5f135b6fae3b9f} 2025/04/30 10:09:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3308483fe2179d2dc2 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:57 client Dropping Initial keys. 2025/04/30 10:09:57 client -> Sending packet 1 (110 bytes) for connection 3308483fe2179d2dc2, Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client Short Header{DestConnectionID: 000000000000100399b70bb5b768c44ca5efbdaf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:57 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:57 client Dropping Handshake keys. 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003f936f92fcc538d2da735b9bf, StatelessResetToken: 0x33bcb46294b39a858eef058bd37e31a6} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003e8ba3ffe17a62ac9017ecadb, StatelessResetToken: 0x00de21e6cb2b69ef5fe254aa8fc0df04} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010033f053f6e9daa7b97a6b684b0, StatelessResetToken: 0x59bfc86d42de248e7b86b7596cfbdc02} 2025/04/30 10:09:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:57 client -> Sending packet 1 (46 bytes) for connection 3308483fe2179d2dc2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003f936f92fcc538d2da735b9bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 113.995µs} 2025/04/30 10:09:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:57 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client newly acked packets (1): [0] 2025/04/30 10:09:57 client updated RTT: 33.945ms (σ: 12.809ms) 2025/04/30 10:09:57 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:57 client -> Sending packet 2 (42 bytes) for connection 3308483fe2179d2dc2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003f936f92fcc538d2da735b9bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:57 client Connection 3308483fe2179d2dc2 closed. 2025/04/30 10:09:57 Requesting https://server4:443/arrdjtjpwt. 2025/04/30 10:09:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:57 Increased send buffer size to 14336 kiB 2025/04/30 10:09:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:57 Created qlog file: /logs/qlog/6a86b93a7884b163a33a8167fcaec3c5053e.sqlog 2025/04/30 10:09:57 client Starting new connection to server4 ([::]:36885 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a86b93a7884b163a33a8167fcaec3c5053e, version v1 2025/04/30 10:09:57 Adding connection ID (empty). 2025/04/30 10:09:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:57 client -> Sending packet 0 (1280 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 6a86b93a7884b163a33a8167fcaec3c5053e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:57 client -> Sending packet 1 (1280 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 6a86b93a7884b163a33a8167fcaec3c5053e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:57 client -> Sending packet 2 (1280 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 6a86b93a7884b163a33a8167fcaec3c5053e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:57 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003160dcac174ebcbb2836de572, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:57 client Received first packet. Switching destination connection ID to: 0000000000001003160dcac174ebcbb2836de572 2025/04/30 10:09:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:57 client newly acked packets (1): [2] 2025/04/30 10:09:57 client updated RTT: 35.495634ms (σ: 17.747817ms) 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:57 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003160dcac174ebcbb2836de572, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:09:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a86b93a7884b163a33a8167fcaec3c5053e, InitialSourceConnectionID: 0000000000001003160dcac174ebcbb2836de572, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xbc62157db15185a6cd80b10e8dafd9c5} 2025/04/30 10:09:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 0000000000001003160dcac174ebcbb2836de572, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003160dcac174ebcbb2836de572, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:57 client Dropping Initial keys. 2025/04/30 10:09:57 client -> Sending packet 1 (110 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003160dcac174ebcbb2836de572, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003160dcac174ebcbb2836de572, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:57 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:57 client Dropping Handshake keys. 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100320d7a271c0b5edd29a9b03ef, StatelessResetToken: 0xcb4e837ee358ca88c71bdcdcc9667112} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003e2cebbe4e45873f98b2ac275, StatelessResetToken: 0xed4efa6df929e12ed116db17fd1dff6b} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003dee4b75cd710f6c1e179d5c4, StatelessResetToken: 0x82f50396d0fce7d9478a6dd03b12839d} 2025/04/30 10:09:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:57 client -> Sending packet 1 (46 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 000000000000100320d7a271c0b5edd29a9b03ef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.084µs} 2025/04/30 10:09:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:57 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.PingFrame{} 2025/04/30 10:09:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:57 client -> Sending packet 2 (46 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 000000000000100320d7a271c0b5edd29a9b03ef, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 71.905µs} 2025/04/30 10:09:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:57 client -> Sending packet 4 (58 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 000000000000100320d7a271c0b5edd29a9b03ef, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:57 client Skipping packet number 3 2025/04/30 10:09:57 client -> Sending packet 5 (41 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 000000000000100320d7a271c0b5edd29a9b03ef, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:57 client <- Reading packet 4 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 000000000000100304494f64ff7c68344ffc5f27, StatelessResetToken: 0xa8807fba04d2d9f39c752afc6423cbb5} 2025/04/30 10:09:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:57 client -> Sending packet 6 (42 bytes) for connection 6a86b93a7884b163a33a8167fcaec3c5053e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 000000000000100320d7a271c0b5edd29a9b03ef, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:57 client Connection 6a86b93a7884b163a33a8167fcaec3c5053e closed. 2025/04/30 10:09:57 Requesting https://server4:443/ehfpiucyqf. 2025/04/30 10:09:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:57 Increased send buffer size to 14336 kiB 2025/04/30 10:09:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:57 Created qlog file: /logs/qlog/6c799dc5dfd200879a2a341c.sqlog 2025/04/30 10:09:57 client Starting new connection to server4 ([::]:35656 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6c799dc5dfd200879a2a341c, version v1 2025/04/30 10:09:57 Adding connection ID (empty). 2025/04/30 10:09:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:57 client -> Sending packet 0 (1280 bytes) for connection 6c799dc5dfd200879a2a341c, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 6c799dc5dfd200879a2a341c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:09:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:57 client -> Sending packet 1 (1280 bytes) for connection 6c799dc5dfd200879a2a341c, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 6c799dc5dfd200879a2a341c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:09:57 client -> Sending packet 2 (1280 bytes) for connection 6c799dc5dfd200879a2a341c, Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 6c799dc5dfd200879a2a341c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:57 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:57 client Received first packet. Switching destination connection ID to: 0000000000001003127eefe6decfaa98a53de3e8 2025/04/30 10:09:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:57 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6c799dc5dfd200879a2a341c, InitialSourceConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xd3b1e1dfeacdc4c54374e0f7a8bb942a} 2025/04/30 10:09:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6c799dc5dfd200879a2a341c 2025/04/30 10:09:57 client Long Header{Type: Initial, DestConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:57 client Dropping Initial keys. 2025/04/30 10:09:57 client -> Sending packet 1 (52 bytes) for connection 6c799dc5dfd200879a2a341c, Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client -> Sending packet 0 (58 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:57 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:57 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:57 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:57 client -> Sending packet 2 (52 bytes) for connection 6c799dc5dfd200879a2a341c, Handshake 2025/04/30 10:09:57 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003127eefe6decfaa98a53de3e8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:57 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:57 client Dropping Handshake keys. 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, StatelessResetToken: 0xcf59456b4fbd7458b07edcc7520d6834} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003d3769b33a5d95c89417a35f5, StatelessResetToken: 0x0717f69c3c2acf685fb16db0e5be8781} 2025/04/30 10:09:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003cb0e999382898dde911c5069, StatelessResetToken: 0xe1d24743a080a4a377dcd946c4ccc633} 2025/04/30 10:09:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:57 client -> Sending packet 1 (1366 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.PingFrame{} 2025/04/30 10:09:57 client -> Sending packet 2 (46 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 155.333µs} 2025/04/30 10:09:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:57 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:57 client <- &wire.PingFrame{} 2025/04/30 10:09:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:57 client -> Sending packet 3 (46 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:57 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 116.168µs} 2025/04/30 10:09:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:58 client -> Sending packet 5 (58 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:58 client Skipping packet number 4 2025/04/30 10:09:58 client -> Sending packet 6 (41 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:58 client <- Reading packet 3 (65 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:09:58 client newly acked packets (2): [1 6] 2025/04/30 10:09:58 client updated RTT: 31.071795ms (σ: 15.535897ms) 2025/04/30 10:09:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:58 client setting loss timer for packet 5 (1-RTT) to 34.955769ms (in 2025-04-30 10:09:58.104917749 +0000 UTC m=+21.135377912) 2025/04/30 10:09:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010035d023593d0073c5365a0c8b4, StatelessResetToken: 0x2d3a652acf3fbfe8154973c62a0897cc} 2025/04/30 10:09:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:58 client -> Sending packet 7 (1409 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.PingFrame{} 2025/04/30 10:09:58 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:09:58.104917749 +0000 UTC m=+21.135377912 2025/04/30 10:09:58 client lost packet 5 (time threshold) 2025/04/30 10:09:58 client Canceling loss detection timer. 2025/04/30 10:09:58 client -> Sending packet 8 (66 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 4.427945ms} 2025/04/30 10:09:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:58 client <- Reading packet 4 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:09:58 client newly acked packets (1): [8] 2025/04/30 10:09:58 client updated RTT: 31.229ms (σ: 11.968ms) 2025/04/30 10:09:58 client lost packet 7 (time threshold) 2025/04/30 10:09:58 client Canceling loss detection timer. 2025/04/30 10:09:58 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:58 client Ignoring all packets below 4. 2025/04/30 10:09:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:58 client -> Sending packet 9 (42 bytes) for connection 6c799dc5dfd200879a2a341c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 0000000000001003075241800288b6c5b2f7d5a2, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:58 client Connection 6c799dc5dfd200879a2a341c closed. 2025/04/30 10:09:58 Requesting https://server4:443/zcgxqehzwa. 2025/04/30 10:09:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:58 Increased send buffer size to 14336 kiB 2025/04/30 10:09:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:58 Created qlog file: /logs/qlog/7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52.sqlog 2025/04/30 10:09:58 client Starting new connection to server4 ([::]:36124 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, version v1 2025/04/30 10:09:58 Adding connection ID (empty). 2025/04/30 10:09:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:58 client -> Sending packet 0 (1280 bytes) for connection 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:09:58 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:58 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010038d5744058e6b6f8393f251a4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:58 client Received first packet. Switching destination connection ID to: 00000000000010038d5744058e6b6f8393f251a4 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client newly acked packets (1): [0] 2025/04/30 10:09:58 client updated RTT: 34.095416ms (σ: 17.047708ms) 2025/04/30 10:09:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:58 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010038d5744058e6b6f8393f251a4, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 10:09:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, InitialSourceConnectionID: 00000000000010038d5744058e6b6f8393f251a4, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xc00ebfedc6ef7c034f3dd824ab87051f} 2025/04/30 10:09:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: 00000000000010038d5744058e6b6f8393f251a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client Long Header{Type: Handshake, DestConnectionID: 00000000000010038d5744058e6b6f8393f251a4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:58 client Dropping Initial keys. 2025/04/30 10:09:58 client -> Sending packet 1 (110 bytes) for connection 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, Handshake 2025/04/30 10:09:58 client Long Header{Type: Handshake, DestConnectionID: 00000000000010038d5744058e6b6f8393f251a4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client Short Header{DestConnectionID: 00000000000010038d5744058e6b6f8393f251a4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:58 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client Peer doesn't await address validation any longer. 2025/04/30 10:09:58 client newly acked packets (1): [0] 2025/04/30 10:09:58 client updated RTT: 34.056ms (σ: 12.863ms) 2025/04/30 10:09:58 client Canceling loss detection timer. 2025/04/30 10:09:58 client Dropping Handshake keys. 2025/04/30 10:09:58 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:58 client -> Sending packet 1 (44 bytes) for connection 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 00000000000010038d5744058e6b6f8393f251a4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 117.471µs} 2025/04/30 10:09:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:58 client -> Sending packet 2 (42 bytes) for connection 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 00000000000010038d5744058e6b6f8393f251a4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:58 client Connection 7209b45ca7d1fd7ea37b1bbe14ea32bb233cdb52 closed. 2025/04/30 10:09:58 Requesting https://server4:443/pmemxzwudq. 2025/04/30 10:09:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:58 Increased send buffer size to 14336 kiB 2025/04/30 10:09:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:58 Created qlog file: /logs/qlog/f0b7f7d3423bce4fe0d170c0.sqlog 2025/04/30 10:09:58 client Starting new connection to server4 ([::]:52365 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f0b7f7d3423bce4fe0d170c0, version v1 2025/04/30 10:09:58 Adding connection ID (empty). 2025/04/30 10:09:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:58 client -> Sending packet 0 (1280 bytes) for connection f0b7f7d3423bce4fe0d170c0, Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: f0b7f7d3423bce4fe0d170c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:09:58 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:58 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:58 client Received first packet. Switching destination connection ID to: 00000000000010037f8f91e5f02de3bc18ca7dcf 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client newly acked packets (1): [0] 2025/04/30 10:09:58 client updated RTT: 34.128537ms (σ: 17.064268ms) 2025/04/30 10:09:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:58 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:09:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f0b7f7d3423bce4fe0d170c0, InitialSourceConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xfab9f3723c7cda65f33f0e63a10c4eb4} 2025/04/30 10:09:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f0b7f7d3423bce4fe0d170c0 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:58 client Dropping Initial keys. 2025/04/30 10:09:58 client -> Sending packet 1 (52 bytes) for connection f0b7f7d3423bce4fe0d170c0, Handshake 2025/04/30 10:09:58 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client -> Sending packet 0 (58 bytes) for connection f0b7f7d3423bce4fe0d170c0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 00000000000010037f8f91e5f02de3bc18ca7dcf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:58 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:58 client Dropping Handshake keys. 2025/04/30 10:09:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100340c5f92bfc35f06c6d4e103d, StatelessResetToken: 0x68f6ca83a049287087d0011cef1993b4} 2025/04/30 10:09:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100390299e9625334f7b100f9adc, StatelessResetToken: 0x5a019db6e8eb829bc16e391a1c1c979b} 2025/04/30 10:09:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100314785b170f47f9b43d06107b, StatelessResetToken: 0x10e00cf89c2327c72fb61b7beb82c1e9} 2025/04/30 10:09:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:58 client -> Sending packet 1 (46 bytes) for connection f0b7f7d3423bce4fe0d170c0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 000000000000100340c5f92bfc35f06c6d4e103d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 107.623µs} 2025/04/30 10:09:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:58 client <- Reading packet 2 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:58 client newly acked packets (2): [0 1] 2025/04/30 10:09:58 client updated RTT: 33.723ms (σ: 13.606ms) 2025/04/30 10:09:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:58 client Canceling loss detection timer. 2025/04/30 10:09:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010036f7ffe6600d1103da091d804, StatelessResetToken: 0xedc9259c61d62838143fc8a7b4919e9d} 2025/04/30 10:09:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:58 client Ignoring all packets below 1. 2025/04/30 10:09:58 client -> Sending packet 2 (44 bytes) for connection f0b7f7d3423bce4fe0d170c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 000000000000100340c5f92bfc35f06c6d4e103d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 100.409µs} 2025/04/30 10:09:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:58 client <- Reading packet 3 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.PingFrame{} 2025/04/30 10:09:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:58 client Sending ACK because the ACK timer expired. 2025/04/30 10:09:58 client -> Sending packet 3 (45 bytes) for connection f0b7f7d3423bce4fe0d170c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 000000000000100340c5f92bfc35f06c6d4e103d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.28836ms} 2025/04/30 10:09:58 client <- Reading packet 4 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:58 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:58 client -> Sending packet 4 (42 bytes) for connection f0b7f7d3423bce4fe0d170c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:58 client Short Header{DestConnectionID: 000000000000100340c5f92bfc35f06c6d4e103d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:58 client Connection f0b7f7d3423bce4fe0d170c0 closed. 2025/04/30 10:09:58 Requesting https://server4:443/hogvwgcmuc. 2025/04/30 10:09:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:58 Increased send buffer size to 14336 kiB 2025/04/30 10:09:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:58 Created qlog file: /logs/qlog/e3e9c19a033d1b942927507d80b790.sqlog 2025/04/30 10:09:58 client Starting new connection to server4 ([::]:46872 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e3e9c19a033d1b942927507d80b790, version v1 2025/04/30 10:09:58 Adding connection ID (empty). 2025/04/30 10:09:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:58 client -> Sending packet 0 (1280 bytes) for connection e3e9c19a033d1b942927507d80b790, Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: e3e9c19a033d1b942927507d80b790, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:58 client -> Sending packet 1 (1280 bytes) for connection e3e9c19a033d1b942927507d80b790, Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: e3e9c19a033d1b942927507d80b790, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:58 client -> Sending packet 2 (1280 bytes) for connection e3e9c19a033d1b942927507d80b790, Initial 2025/04/30 10:09:58 client Long Header{Type: Initial, DestConnectionID: e3e9c19a033d1b942927507d80b790, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:09:59 client -> Sending packet 3 (1280 bytes) for connection e3e9c19a033d1b942927507d80b790, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: e3e9c19a033d1b942927507d80b790, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:59 client -> Sending packet 4 (1280 bytes) for connection e3e9c19a033d1b942927507d80b790, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: e3e9c19a033d1b942927507d80b790, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:59 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010033bcb2e8b9678278998646af6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:59 client Received first packet. Switching destination connection ID to: 00000000000010033bcb2e8b9678278998646af6 2025/04/30 10:09:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:59 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010033bcb2e8b9678278998646af6, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:09:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e3e9c19a033d1b942927507d80b790, InitialSourceConnectionID: 00000000000010033bcb2e8b9678278998646af6, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x0af8e16d83e6f5cea84c149a7f5067f8} 2025/04/30 10:09:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e3e9c19a033d1b942927507d80b790 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: 00000000000010033bcb2e8b9678278998646af6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 00000000000010033bcb2e8b9678278998646af6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:59 client Dropping Initial keys. 2025/04/30 10:09:59 client -> Sending packet 1 (52 bytes) for connection e3e9c19a033d1b942927507d80b790, Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 00000000000010033bcb2e8b9678278998646af6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client -> Sending packet 0 (58 bytes) for connection e3e9c19a033d1b942927507d80b790, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 00000000000010033bcb2e8b9678278998646af6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:59 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client Peer doesn't await address validation any longer. 2025/04/30 10:09:59 client newly acked packets (1): [0] 2025/04/30 10:09:59 client updated RTT: 33.86265ms (σ: 16.931325ms) 2025/04/30 10:09:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:59 client Canceling loss detection timer. 2025/04/30 10:09:59 client Dropping Handshake keys. 2025/04/30 10:09:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:59 client -> Sending packet 1 (44 bytes) for connection e3e9c19a033d1b942927507d80b790, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 00000000000010033bcb2e8b9678278998646af6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 114.656µs} 2025/04/30 10:09:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:59 client -> Sending packet 2 (42 bytes) for connection e3e9c19a033d1b942927507d80b790, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 00000000000010033bcb2e8b9678278998646af6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:59 client Connection e3e9c19a033d1b942927507d80b790 closed. 2025/04/30 10:09:59 Requesting https://server4:443/libpcvysed. 2025/04/30 10:09:59 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:59 Increased send buffer size to 14336 kiB 2025/04/30 10:09:59 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:59 Created qlog file: /logs/qlog/d6c8b362b97eac928c9c14099151.sqlog 2025/04/30 10:09:59 client Starting new connection to server4 ([::]:51619 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d6c8b362b97eac928c9c14099151, version v1 2025/04/30 10:09:59 Adding connection ID (empty). 2025/04/30 10:09:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:59 client -> Sending packet 0 (1280 bytes) for connection d6c8b362b97eac928c9c14099151, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: d6c8b362b97eac928c9c14099151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:09:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:59 client -> Sending packet 1 (1280 bytes) for connection d6c8b362b97eac928c9c14099151, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: d6c8b362b97eac928c9c14099151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:09:59 client -> Sending packet 2 (1280 bytes) for connection d6c8b362b97eac928c9c14099151, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: d6c8b362b97eac928c9c14099151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:59 client <- Reading packet 2 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100302bc928c97c34b280c8e4709, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:59 client Received first packet. Switching destination connection ID to: 000000000000100302bc928c97c34b280c8e4709 2025/04/30 10:09:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client newly acked packets (1): [2] 2025/04/30 10:09:59 client updated RTT: 34.000606ms (σ: 17.000303ms) 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:59 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100302bc928c97c34b280c8e4709, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:09:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d6c8b362b97eac928c9c14099151, InitialSourceConnectionID: 000000000000100302bc928c97c34b280c8e4709, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x52b7403864808b5f23ea1bc3828ac3f7} 2025/04/30 10:09:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d6c8b362b97eac928c9c14099151 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: 000000000000100302bc928c97c34b280c8e4709, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 000000000000100302bc928c97c34b280c8e4709, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:59 client Dropping Initial keys. 2025/04/30 10:09:59 client -> Sending packet 1 (52 bytes) for connection d6c8b362b97eac928c9c14099151, Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 000000000000100302bc928c97c34b280c8e4709, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:09:59 client -> Sending packet 0 (58 bytes) for connection d6c8b362b97eac928c9c14099151, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 000000000000100302bc928c97c34b280c8e4709, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:59 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:59 client Dropping Handshake keys. 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100372b5a2f75c2ff60b99ec2e33, StatelessResetToken: 0xd9ca8c7cf626907cd5337d0d8ca6113c} 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003b5ef1e1440dbfdc8dab17075, StatelessResetToken: 0x3020bd440a2295efa7807017d5138740} 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003b26d5ec0bc02d90dc1343def, StatelessResetToken: 0x1817b1dde6b3776734ece8ca03d8ad76} 2025/04/30 10:09:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:59 client -> Sending packet 1 (46 bytes) for connection d6c8b362b97eac928c9c14099151, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 000000000000100372b5a2f75c2ff60b99ec2e33, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 122.991µs} 2025/04/30 10:09:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:59 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client newly acked packets (1): [0] 2025/04/30 10:09:59 client updated RTT: 33.995ms (σ: 12.759ms) 2025/04/30 10:09:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:09:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:09:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:09:59 client -> Sending packet 2 (42 bytes) for connection d6c8b362b97eac928c9c14099151, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 000000000000100372b5a2f75c2ff60b99ec2e33, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:09:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:09:59 client Connection d6c8b362b97eac928c9c14099151 closed. 2025/04/30 10:09:59 Requesting https://server4:443/ounyafqxzx. 2025/04/30 10:09:59 Increased receive buffer size to 14336 kiB 2025/04/30 10:09:59 Increased send buffer size to 14336 kiB 2025/04/30 10:09:59 Setting DF for IPv4 and IPv6. 2025/04/30 10:09:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:09:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:09:59 Created qlog file: /logs/qlog/712cdf3850c4e33ab328a2e86bc79d.sqlog 2025/04/30 10:09:59 client Starting new connection to server4 ([::]:53080 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 712cdf3850c4e33ab328a2e86bc79d, version v1 2025/04/30 10:09:59 Adding connection ID (empty). 2025/04/30 10:09:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:09:59 client -> Sending packet 0 (1280 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: 712cdf3850c4e33ab328a2e86bc79d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:09:59 client -> Sending packet 1 (1280 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: 712cdf3850c4e33ab328a2e86bc79d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:59 client -> Sending packet 2 (1280 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: 712cdf3850c4e33ab328a2e86bc79d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:59 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:09:59 client Received first packet. Switching destination connection ID to: 00000000000010037e853c11ec1d6a072942fdb1 2025/04/30 10:09:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:09:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:59 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:09:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:09:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 712cdf3850c4e33ab328a2e86bc79d, InitialSourceConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x3d0a29ba4509f7bc4cc19fd5e203ea67} 2025/04/30 10:09:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d 2025/04/30 10:09:59 client Long Header{Type: Initial, DestConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:09:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:09:59 client Dropping Initial keys. 2025/04/30 10:09:59 client -> Sending packet 1 (110 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client Short Header{DestConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:09:59 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:09:59 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:09:59 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:09:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:09:59 client -> Sending packet 2 (52 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, Handshake 2025/04/30 10:09:59 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037e853c11ec1d6a072942fdb1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:09:59 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:09:59 client Dropping Handshake keys. 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, StatelessResetToken: 0xf6a13c31ab32363f3b5bc0f7844b063c} 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003e2403ee48c018259d03938d7, StatelessResetToken: 0x73fed5a8c22dda951de722d45f3b2a44} 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003067cb849281824de796d958e, StatelessResetToken: 0x30472c0cae05c351147be98343b126b5} 2025/04/30 10:09:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:09:59 client -> Sending packet 1 (1366 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.PingFrame{} 2025/04/30 10:09:59 client -> Sending packet 2 (46 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 123.422µs} 2025/04/30 10:09:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:09:59 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.PingFrame{} 2025/04/30 10:09:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:59 client -> Sending packet 3 (46 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 68.208µs} 2025/04/30 10:09:59 client <- Reading packet 3 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:09:59 client newly acked packets (2): [1 2] 2025/04/30 10:09:59 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:09:59 client lost packet 0 (time threshold) 2025/04/30 10:09:59 client Canceling loss detection timer. 2025/04/30 10:09:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003933e20ec24812526357e7d3e, StatelessResetToken: 0x9560da11d118f2093dc5a8a85daa6ab6} 2025/04/30 10:09:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:09:59 client Ignoring all packets below 1. 2025/04/30 10:09:59 client -> Sending packet 4 (1409 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.PingFrame{} 2025/04/30 10:09:59 client -> Sending packet 5 (63 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 140.715µs} 2025/04/30 10:09:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:59 client <- Reading packet 5 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.PingFrame{} 2025/04/30 10:09:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:09:59 client <- Reading packet 6 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:09:59 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:09:59 client <- &wire.PingFrame{} 2025/04/30 10:09:59 client -> Sending packet 6 (46 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 87.585µs} 2025/04/30 10:09:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:09:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:09:59 client -> Sending packet 8 (58 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:09:59 client -> Sending packet 9 (58 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:09:59 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:09:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:00 client <- Reading packet 7 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:00 client newly acked packets (2): [4 9] 2025/04/30 10:10:00 client updated RTT: 32.24237ms (σ: 16.121185ms) 2025/04/30 10:10:00 client Canceling loss detection timer. 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:00 client -> Sending packet 10 (1430 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.PingFrame{} 2025/04/30 10:10:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:00 client -> Sending packet 11 (42 bytes) for connection 712cdf3850c4e33ab328a2e86bc79d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 0000000000001003bb3a06ad66d3fb94aab3908d, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:00 client Connection 712cdf3850c4e33ab328a2e86bc79d closed. 2025/04/30 10:10:00 Requesting https://server4:443/hmhnzzgtbc. 2025/04/30 10:10:00 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:00 Increased send buffer size to 14336 kiB 2025/04/30 10:10:00 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:00 Created qlog file: /logs/qlog/790d53ac8bf7f1517da336e2d8592f3a279d.sqlog 2025/04/30 10:10:00 client Starting new connection to server4 ([::]:35191 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 790d53ac8bf7f1517da336e2d8592f3a279d, version v1 2025/04/30 10:10:00 Adding connection ID (empty). 2025/04/30 10:10:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:00 client -> Sending packet 0 (1280 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 790d53ac8bf7f1517da336e2d8592f3a279d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:10:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:00 client -> Sending packet 1 (1280 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 790d53ac8bf7f1517da336e2d8592f3a279d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:10:00 client -> Sending packet 2 (1280 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 790d53ac8bf7f1517da336e2d8592f3a279d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:10:00 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:00 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cf374a49014a1c929689608f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:00 client Received first packet. Switching destination connection ID to: 0000000000001003cf374a49014a1c929689608f 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:00 client newly acked packets (1): [2] 2025/04/30 10:10:00 client updated RTT: 35.200209ms (σ: 17.600104ms) 2025/04/30 10:10:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:00 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cf374a49014a1c929689608f, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 10:10:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 790d53ac8bf7f1517da336e2d8592f3a279d, InitialSourceConnectionID: 0000000000001003cf374a49014a1c929689608f, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x58faa85d26af0b62e76a48b6abd4a3de} 2025/04/30 10:10:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 0000000000001003cf374a49014a1c929689608f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cf374a49014a1c929689608f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:00 client Dropping Initial keys. 2025/04/30 10:10:00 client -> Sending packet 1 (52 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, Handshake 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cf374a49014a1c929689608f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client -> Sending packet 0 (58 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 0000000000001003cf374a49014a1c929689608f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:00 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:00 client Dropping Handshake keys. 2025/04/30 10:10:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100399bfd7936d548992d9541f17, StatelessResetToken: 0xa9ac629fe078f54b3464aae011f11365} 2025/04/30 10:10:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003e0ac951205bec21606e5fa0d, StatelessResetToken: 0xf4a4599072b97b3f8745594a537df0ec} 2025/04/30 10:10:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010034330df10c5c45eb3e0f36be5, StatelessResetToken: 0x6e1056af56e141d28a03b11c7abc54be} 2025/04/30 10:10:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:00 client -> Sending packet 1 (46 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 000000000000100399bfd7936d548992d9541f17, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 123.272µs} 2025/04/30 10:10:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:00 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.PingFrame{} 2025/04/30 10:10:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:00 client -> Sending packet 2 (46 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 000000000000100399bfd7936d548992d9541f17, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88.035µs} 2025/04/30 10:10:00 client <- Reading packet 3 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:10:00 client newly acked packets (1): [0] 2025/04/30 10:10:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:00 client lost packet 1 (time threshold) 2025/04/30 10:10:00 client Canceling loss detection timer. 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:00 client -> Sending packet 3 (48 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 000000000000100399bfd7936d548992d9541f17, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 109.225µs} 2025/04/30 10:10:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:00 client -> Sending packet 4 (42 bytes) for connection 790d53ac8bf7f1517da336e2d8592f3a279d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 000000000000100399bfd7936d548992d9541f17, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:00 client Connection 790d53ac8bf7f1517da336e2d8592f3a279d closed. 2025/04/30 10:10:00 Requesting https://server4:443/bmzierlitv. 2025/04/30 10:10:00 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:00 Increased send buffer size to 14336 kiB 2025/04/30 10:10:00 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:00 Created qlog file: /logs/qlog/a6cb84f18133c4bf40bf20be.sqlog 2025/04/30 10:10:00 client Starting new connection to server4 ([::]:36721 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a6cb84f18133c4bf40bf20be, version v1 2025/04/30 10:10:00 Adding connection ID (empty). 2025/04/30 10:10:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:00 client -> Sending packet 0 (1280 bytes) for connection a6cb84f18133c4bf40bf20be, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: a6cb84f18133c4bf40bf20be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:10:00 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:00 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010036db8e10d8459111935d97df9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:00 client Received first packet. Switching destination connection ID to: 00000000000010036db8e10d8459111935d97df9 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client newly acked packets (1): [0] 2025/04/30 10:10:00 client updated RTT: 33.947668ms (σ: 16.973834ms) 2025/04/30 10:10:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:00 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010036db8e10d8459111935d97df9, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 10:10:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a6cb84f18133c4bf40bf20be, InitialSourceConnectionID: 00000000000010036db8e10d8459111935d97df9, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0xd8f0151cf90e7a3d5dd1d2d42d87f7a6} 2025/04/30 10:10:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a6cb84f18133c4bf40bf20be 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 00000000000010036db8e10d8459111935d97df9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036db8e10d8459111935d97df9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:00 client Dropping Initial keys. 2025/04/30 10:10:00 client -> Sending packet 1 (52 bytes) for connection a6cb84f18133c4bf40bf20be, Handshake 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: 00000000000010036db8e10d8459111935d97df9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client -> Sending packet 0 (58 bytes) for connection a6cb84f18133c4bf40bf20be, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 00000000000010036db8e10d8459111935d97df9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:00 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client Peer doesn't await address validation any longer. 2025/04/30 10:10:00 client newly acked packets (1): [0] 2025/04/30 10:10:00 client updated RTT: 33.92ms (σ: 12.782ms) 2025/04/30 10:10:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:00 client Canceling loss detection timer. 2025/04/30 10:10:00 client Dropping Handshake keys. 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:00 client -> Sending packet 1 (44 bytes) for connection a6cb84f18133c4bf40bf20be, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 00000000000010036db8e10d8459111935d97df9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 116.178µs} 2025/04/30 10:10:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:00 client -> Sending packet 2 (42 bytes) for connection a6cb84f18133c4bf40bf20be, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 00000000000010036db8e10d8459111935d97df9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:00 client Connection a6cb84f18133c4bf40bf20be closed. 2025/04/30 10:10:00 Requesting https://server4:443/uadnqieblj. 2025/04/30 10:10:00 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:00 Increased send buffer size to 14336 kiB 2025/04/30 10:10:00 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:00 Created qlog file: /logs/qlog/b18d94fcbad49ef317.sqlog 2025/04/30 10:10:00 client Starting new connection to server4 ([::]:59079 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b18d94fcbad49ef317, version v1 2025/04/30 10:10:00 Adding connection ID (empty). 2025/04/30 10:10:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:00 client -> Sending packet 0 (1280 bytes) for connection b18d94fcbad49ef317, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: b18d94fcbad49ef317, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:10:00 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:00 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010037325d26a16e8d07f103b0473, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:00 client Received first packet. Switching destination connection ID to: 00000000000010037325d26a16e8d07f103b0473 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client newly acked packets (1): [0] 2025/04/30 10:10:00 client updated RTT: 33.863928ms (σ: 16.931964ms) 2025/04/30 10:10:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:00 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010037325d26a16e8d07f103b0473, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 10:10:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b18d94fcbad49ef317, InitialSourceConnectionID: 00000000000010037325d26a16e8d07f103b0473, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1a1ddcacc3cead3bb7b288ec3b7b95cc} 2025/04/30 10:10:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b18d94fcbad49ef317 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 00000000000010037325d26a16e8d07f103b0473, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037325d26a16e8d07f103b0473, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:00 client Dropping Initial keys. 2025/04/30 10:10:00 client -> Sending packet 1 (52 bytes) for connection b18d94fcbad49ef317, Handshake 2025/04/30 10:10:00 client Long Header{Type: Handshake, DestConnectionID: 00000000000010037325d26a16e8d07f103b0473, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client -> Sending packet 0 (58 bytes) for connection b18d94fcbad49ef317, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 00000000000010037325d26a16e8d07f103b0473, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:00 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:00 client Dropping Handshake keys. 2025/04/30 10:10:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003f31067042e4ba744cb5c7a31, StatelessResetToken: 0xb058267d4738ecf3f62bc5249ef9f805} 2025/04/30 10:10:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 00000000000010035fa4bf8566cad97840cf7906, StatelessResetToken: 0xa909cd9ee33eeea43f38c0a05318053f} 2025/04/30 10:10:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003314d0937a9d21f953abd210a, StatelessResetToken: 0x3bdedd90118fc43b59c61c33305f249f} 2025/04/30 10:10:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:00 client -> Sending packet 1 (46 bytes) for connection b18d94fcbad49ef317, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 0000000000001003f31067042e4ba744cb5c7a31, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 77.085µs} 2025/04/30 10:10:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:00 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:00 client newly acked packets (1): [0] 2025/04/30 10:10:00 client updated RTT: 33.823ms (σ: 12.778ms) 2025/04/30 10:10:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:00 client -> Sending packet 2 (42 bytes) for connection b18d94fcbad49ef317, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:00 client Short Header{DestConnectionID: 0000000000001003f31067042e4ba744cb5c7a31, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:00 client Connection b18d94fcbad49ef317 closed. 2025/04/30 10:10:00 Requesting https://server4:443/spvwhksnyf. 2025/04/30 10:10:00 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:00 Increased send buffer size to 14336 kiB 2025/04/30 10:10:00 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:00 Created qlog file: /logs/qlog/2cd150ec54e692c9138b04ae.sqlog 2025/04/30 10:10:00 client Starting new connection to server4 ([::]:52445 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2cd150ec54e692c9138b04ae, version v1 2025/04/30 10:10:00 Adding connection ID (empty). 2025/04/30 10:10:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:00 client -> Sending packet 0 (1280 bytes) for connection 2cd150ec54e692c9138b04ae, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 2cd150ec54e692c9138b04ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:00 client -> Sending packet 1 (1280 bytes) for connection 2cd150ec54e692c9138b04ae, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 2cd150ec54e692c9138b04ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:00 client -> Sending packet 2 (1280 bytes) for connection 2cd150ec54e692c9138b04ae, Initial 2025/04/30 10:10:00 client Long Header{Type: Initial, DestConnectionID: 2cd150ec54e692c9138b04ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:10:01 client -> Sending packet 3 (1280 bytes) for connection 2cd150ec54e692c9138b04ae, Initial 2025/04/30 10:10:01 client Long Header{Type: Initial, DestConnectionID: 2cd150ec54e692c9138b04ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:01 client -> Sending packet 4 (1280 bytes) for connection 2cd150ec54e692c9138b04ae, Initial 2025/04/30 10:10:01 client Long Header{Type: Initial, DestConnectionID: 2cd150ec54e692c9138b04ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:10:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:10:01 client Parsed a coalesced packet. Part 1: 148 bytes. Remaining: 1052 bytes. 2025/04/30 10:10:01 client <- Reading packet 1 (148 bytes) for connection (empty), Initial 2025/04/30 10:10:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010039bcac7f7469f09936434fbf2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/04/30 10:10:01 client Received first packet. Switching destination connection ID to: 00000000000010039bcac7f7469f09936434fbf2 2025/04/30 10:10:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:10:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:01 client Parsed a coalesced packet. Part 2: 1052 bytes. Remaining: 0 bytes. 2025/04/30 10:10:01 client <- Reading packet 1 (1052 bytes) for connection (empty), Handshake 2025/04/30 10:10:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010039bcac7f7469f09936434fbf2, PacketNumber: 1, PacketNumberLen: 1, Length: 1023, Version: v1} 2025/04/30 10:10:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 10:10:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2cd150ec54e692c9138b04ae, InitialSourceConnectionID: 00000000000010039bcac7f7469f09936434fbf2, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x00f0e945c592a4a8fe2e440136f617e8} 2025/04/30 10:10:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2cd150ec54e692c9138b04ae 2025/04/30 10:10:01 client Long Header{Type: Initial, DestConnectionID: 00000000000010039bcac7f7469f09936434fbf2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:01 client Long Header{Type: Handshake, DestConnectionID: 00000000000010039bcac7f7469f09936434fbf2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:01 client Dropping Initial keys. 2025/04/30 10:10:01 client -> Sending packet 1 (52 bytes) for connection 2cd150ec54e692c9138b04ae, Handshake 2025/04/30 10:10:01 client Long Header{Type: Handshake, DestConnectionID: 00000000000010039bcac7f7469f09936434fbf2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:01 client -> Sending packet 0 (58 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039bcac7f7469f09936434fbf2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:01 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:01 client Dropping Handshake keys. 2025/04/30 10:10:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010039e6b0ded331058ba80aa841e, StatelessResetToken: 0x6662be9abe302718cb99a410de9884f5} 2025/04/30 10:10:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003426945867898b596a552c13f, StatelessResetToken: 0x3bbc73731d15e86d77a646989b50b28a} 2025/04/30 10:10:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010039ff24de27d00c16024b6b9a7, StatelessResetToken: 0x24e5a6178ee4de93db482ca7d1f681ec} 2025/04/30 10:10:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:01 client -> Sending packet 1 (1366 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.PingFrame{} 2025/04/30 10:10:01 client -> Sending packet 2 (46 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 161.193µs} 2025/04/30 10:10:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:01 client <- Reading packet 1 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:01 client newly acked packets (2): [1 2] 2025/04/30 10:10:01 client updated RTT: 32.145278ms (σ: 16.072639ms) 2025/04/30 10:10:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:01 client lost packet 0 (time threshold) 2025/04/30 10:10:01 client Canceling loss detection timer. 2025/04/30 10:10:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0000000000001003f2df351607d5b8584fa534da, StatelessResetToken: 0x0fe9bfb4dbf686d1481c1af7871ff6ce} 2025/04/30 10:10:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:01 client Ignoring all packets below 1. 2025/04/30 10:10:01 client -> Sending packet 3 (63 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 117.791µs} 2025/04/30 10:10:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:01 client -> Sending packet 5 (58 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:01 client -> Sending packet 6 (58 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:01 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 25ms} 2025/04/30 10:10:01 client newly acked packets (1): [6] 2025/04/30 10:10:01 client updated RTT: 35.25ms (σ: 18.265ms) 2025/04/30 10:10:01 client Canceling loss detection timer. 2025/04/30 10:10:01 client -> Sending packet 7 (1409 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.PingFrame{} 2025/04/30 10:10:01 client <- Reading packet 5 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.PingFrame{} 2025/04/30 10:10:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:01 client Sending ACK because the ACK timer expired. 2025/04/30 10:10:01 client -> Sending packet 8 (47 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.279034ms} 2025/04/30 10:10:01 client <- Reading packet 6 (26 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 25ms} 2025/04/30 10:10:01 client newly acked packets (1): [7] 2025/04/30 10:10:01 client updated RTT: 37.985ms (σ: 19.17ms) 2025/04/30 10:10:01 client <- Reading packet 8 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.PingFrame{} 2025/04/30 10:10:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:01 client -> Sending packet 9 (1430 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.PingFrame{} 2025/04/30 10:10:01 client <- Reading packet 9 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.PingFrame{} 2025/04/30 10:10:01 client -> Sending packet 10 (48 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 110.534µs} 2025/04/30 10:10:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:01 client <- Reading packet 11 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.PingFrame{} 2025/04/30 10:10:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:10:01 client -> Sending packet 11 (50 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 104.837µs} 2025/04/30 10:10:01 client <- Reading packet 12 (21 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.PingFrame{} 2025/04/30 10:10:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:01 client Sending ACK because the ACK timer expired. 2025/04/30 10:10:01 client -> Sending packet 12 (51 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.330375ms} 2025/04/30 10:10:01 client <- Reading packet 13 (1061 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:01 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:01 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 5, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 5}}, DelayTime: 0s} 2025/04/30 10:10:01 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:01 client -> Sending packet 13 (42 bytes) for connection 2cd150ec54e692c9138b04ae, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:01 client Short Header{DestConnectionID: 00000000000010039e6b0ded331058ba80aa841e, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:01 client Connection 2cd150ec54e692c9138b04ae closed. 2025/04/30 10:10:01 Requesting https://server4:443/stzxljviwr. 2025/04/30 10:10:01 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:01 Increased send buffer size to 14336 kiB 2025/04/30 10:10:01 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:01 Created qlog file: /logs/qlog/a0ad21b7fe4d109d2018178734aec54b.sqlog 2025/04/30 10:10:01 client Starting new connection to server4 ([::]:54484 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a0ad21b7fe4d109d2018178734aec54b, version v1 2025/04/30 10:10:01 Adding connection ID (empty). 2025/04/30 10:10:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:01 client -> Sending packet 0 (1280 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, Initial 2025/04/30 10:10:01 client Long Header{Type: Initial, DestConnectionID: a0ad21b7fe4d109d2018178734aec54b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:02 client -> Sending packet 1 (1280 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: a0ad21b7fe4d109d2018178734aec54b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:02 client -> Sending packet 2 (1280 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: a0ad21b7fe4d109d2018178734aec54b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:02 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:02 client Received first packet. Switching destination connection ID to: 00000000000010032de8a82cc7ca48edb79f99be 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:02 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 10:10:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a0ad21b7fe4d109d2018178734aec54b, InitialSourceConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x5d5d548845f7af0dcfcde4c296036a2b} 2025/04/30 10:10:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a0ad21b7fe4d109d2018178734aec54b 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:02 client Dropping Initial keys. 2025/04/30 10:10:02 client -> Sending packet 1 (52 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:02 client -> Sending packet 0 (58 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010032de8a82cc7ca48edb79f99be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:02 client Dropping Handshake keys. 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010031d348fb06d13c25b2808835b, StatelessResetToken: 0x9f2b8a70df9e2757fa233ba5215a3e44} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003f9118a4ddb9fd55ead847450, StatelessResetToken: 0xbd5857e00f6605206307f56535e4f4bd} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00000000000010031ead7d6f206cb449cc25df15, StatelessResetToken: 0x42bac39c81361257a4ebc5b83a1e1818} 2025/04/30 10:10:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:02 client -> Sending packet 1 (1366 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010031d348fb06d13c25b2808835b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.PingFrame{} 2025/04/30 10:10:02 client -> Sending packet 2 (46 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010031d348fb06d13c25b2808835b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 117.631µs} 2025/04/30 10:10:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:02 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [0] 2025/04/30 10:10:02 client updated RTT: 34.128574ms (σ: 17.064287ms) 2025/04/30 10:10:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:02 client -> Sending packet 3 (42 bytes) for connection a0ad21b7fe4d109d2018178734aec54b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010031d348fb06d13c25b2808835b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:02 client Connection a0ad21b7fe4d109d2018178734aec54b closed. 2025/04/30 10:10:02 Requesting https://server4:443/mrnddpdybt. 2025/04/30 10:10:02 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:02 Increased send buffer size to 14336 kiB 2025/04/30 10:10:02 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:02 Created qlog file: /logs/qlog/d1190b5d47fc890ec5.sqlog 2025/04/30 10:10:02 client Starting new connection to server4 ([::]:44452 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d1190b5d47fc890ec5, version v1 2025/04/30 10:10:02 Adding connection ID (empty). 2025/04/30 10:10:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:02 client -> Sending packet 0 (1280 bytes) for connection d1190b5d47fc890ec5, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: d1190b5d47fc890ec5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:02 client -> Sending packet 1 (1280 bytes) for connection d1190b5d47fc890ec5, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: d1190b5d47fc890ec5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:02 client -> Sending packet 2 (1280 bytes) for connection d1190b5d47fc890ec5, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: d1190b5d47fc890ec5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:02 client <- Reading packet 1 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:02 client Received first packet. Switching destination connection ID to: 0000000000001003cad2beb7d2d991a3abc9cf2a 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:02 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 10:10:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d1190b5d47fc890ec5, InitialSourceConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x7b305b407c521f732cd9a931a6596018} 2025/04/30 10:10:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d1190b5d47fc890ec5 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:02 client Dropping Initial keys. 2025/04/30 10:10:02 client -> Sending packet 1 (52 bytes) for connection d1190b5d47fc890ec5, Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:02 client -> Sending packet 0 (58 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:02 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:02 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 10:10:02 client -> Sending packet 2 (52 bytes) for connection d1190b5d47fc890ec5, Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 0000000000001003cad2beb7d2d991a3abc9cf2a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:10:02 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:02 client Dropping Handshake keys. 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, StatelessResetToken: 0x8e2e38013ecff19737bc8c1c72182ce0} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100390dbae3e26ad0ad38d6168a8, StatelessResetToken: 0x707c6eb6ddbf1dfbc4cac835c84f8aa2} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003d7767938e37b976515cdd13e, StatelessResetToken: 0x1c041c404872a0ed4cc8c565703327a0} 2025/04/30 10:10:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:02 client -> Sending packet 1 (1366 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.PingFrame{} 2025/04/30 10:10:02 client -> Sending packet 2 (46 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 150.402µs} 2025/04/30 10:10:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:02 client <- Reading packet 1 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [2] 2025/04/30 10:10:02 client updated RTT: 32.014092ms (σ: 16.007046ms) 2025/04/30 10:10:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:02 client lost packet 0 (time threshold) 2025/04/30 10:10:02 client setting loss timer for packet 1 (1-RTT) to 36.015853ms (in 2025-04-30 10:10:02.409051536 +0000 UTC m=+25.439511700) 2025/04/30 10:10:02 client Canceling loss detection timer. 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00000000000010034dfe7e428f6aa929c68418ed, StatelessResetToken: 0xcf79e0fb42796010e5ef7b1aa2207737} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client Ignoring all packets below 1. 2025/04/30 10:10:02 client -> Sending packet 3 (63 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 147.608µs} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:10:02.409051536 +0000 UTC m=+25.439511700 2025/04/30 10:10:02 client lost packet 1 (time threshold) 2025/04/30 10:10:02 client <- Reading packet 2 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.PingFrame{} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client Sending ACK because the ACK timer expired. 2025/04/30 10:10:02 client -> Sending packet 4 (45 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.291293ms} 2025/04/30 10:10:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:10:02 client -> Sending packet 6 (58 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client -> Sending packet 7 (58 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client <- Reading packet 3 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client -> Sending packet 8 (1323 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.PingFrame{} 2025/04/30 10:10:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:02 client -> Sending packet 9 (42 bytes) for connection d1190b5d47fc890ec5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010030494a7e8fecd4cb2f10145d4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:02 client Connection d1190b5d47fc890ec5 closed. 2025/04/30 10:10:02 Requesting https://server4:443/zwtmuiiszp. 2025/04/30 10:10:02 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:02 Increased send buffer size to 14336 kiB 2025/04/30 10:10:02 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:02 Created qlog file: /logs/qlog/c8c250ccc8d3bef7c6ba7e16aa7687df.sqlog 2025/04/30 10:10:02 client Starting new connection to server4 ([::]:43008 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c8c250ccc8d3bef7c6ba7e16aa7687df, version v1 2025/04/30 10:10:02 Adding connection ID (empty). 2025/04/30 10:10:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:02 client -> Sending packet 0 (1280 bytes) for connection c8c250ccc8d3bef7c6ba7e16aa7687df, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: c8c250ccc8d3bef7c6ba7e16aa7687df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:02 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:02 client Received first packet. Switching destination connection ID to: 000000000000100367a2e3edd3a07dbcac453dbc 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [0] 2025/04/30 10:10:02 client updated RTT: 34.463231ms (σ: 17.231615ms) 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:02 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c8c250ccc8d3bef7c6ba7e16aa7687df, InitialSourceConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x1b046c2044d87c40b1857381373fccb5} 2025/04/30 10:10:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c8c250ccc8d3bef7c6ba7e16aa7687df 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:02 client Dropping Initial keys. 2025/04/30 10:10:02 client -> Sending packet 1 (52 bytes) for connection c8c250ccc8d3bef7c6ba7e16aa7687df, Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client -> Sending packet 0 (58 bytes) for connection c8c250ccc8d3bef7c6ba7e16aa7687df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 000000000000100367a2e3edd3a07dbcac453dbc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:10:02 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:02 client Dropping Handshake keys. 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00000000000010035a411ed438c283d527533ebf, StatelessResetToken: 0xdf08783448d0d0e184b81b41b8d94d8c} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100345b54540e231f603d7f06e48, StatelessResetToken: 0x6f00cd1da6867fd9f82aa143ec117e84} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 000000000000100390529a090fdf03d6080664ab, StatelessResetToken: 0x4b5aefc79e854d52383d1da57c32f002} 2025/04/30 10:10:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:02 client -> Sending packet 1 (46 bytes) for connection c8c250ccc8d3bef7c6ba7e16aa7687df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010035a411ed438c283d527533ebf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 87.204µs} 2025/04/30 10:10:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:02 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [0] 2025/04/30 10:10:02 client updated RTT: 34.387ms (σ: 13.075ms) 2025/04/30 10:10:02 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:02 client -> Sending packet 2 (42 bytes) for connection c8c250ccc8d3bef7c6ba7e16aa7687df, 1-RTT (ECN: Not-ECT) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010035a411ed438c283d527533ebf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:02 client Connection c8c250ccc8d3bef7c6ba7e16aa7687df closed. 2025/04/30 10:10:02 Requesting https://server4:443/cscybeyhyd. 2025/04/30 10:10:02 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:02 Increased send buffer size to 14336 kiB 2025/04/30 10:10:02 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:02 Created qlog file: /logs/qlog/d828b790e6a656f4674f7e22d9d98088.sqlog 2025/04/30 10:10:02 client Starting new connection to server4 ([::]:35689 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d828b790e6a656f4674f7e22d9d98088, version v1 2025/04/30 10:10:02 Adding connection ID (empty). 2025/04/30 10:10:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:02 client -> Sending packet 0 (1280 bytes) for connection d828b790e6a656f4674f7e22d9d98088, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: d828b790e6a656f4674f7e22d9d98088, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:02 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000100301cdd5d03130840337bf928a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:02 client Received first packet. Switching destination connection ID to: 000000000000100301cdd5d03130840337bf928a 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [0] 2025/04/30 10:10:02 client updated RTT: 33.833ms (σ: 16.9165ms) 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:02 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000100301cdd5d03130840337bf928a, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d828b790e6a656f4674f7e22d9d98088, InitialSourceConnectionID: 000000000000100301cdd5d03130840337bf928a, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x6de4cc78e5e7a2d6d96d88f20872be3b} 2025/04/30 10:10:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d828b790e6a656f4674f7e22d9d98088 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: 000000000000100301cdd5d03130840337bf928a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 000000000000100301cdd5d03130840337bf928a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:02 client Dropping Initial keys. 2025/04/30 10:10:02 client -> Sending packet 1 (110 bytes) for connection d828b790e6a656f4674f7e22d9d98088, Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 000000000000100301cdd5d03130840337bf928a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client Short Header{DestConnectionID: 000000000000100301cdd5d03130840337bf928a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:02 client Dropping Handshake keys. 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 000000000000100348a4c645014ce4feb203dad0, StatelessResetToken: 0x33771db99e21439a8180abcd5a80483f} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000000000000100398a0206913b06e02fec9fbd3, StatelessResetToken: 0x00760c794f76633da753a39c7c0c6d9f} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003ffeef5a93571a357bfaf2376, StatelessResetToken: 0x1adf6ce2e770355163fc3d942b9438cc} 2025/04/30 10:10:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:02 client -> Sending packet 1 (46 bytes) for connection d828b790e6a656f4674f7e22d9d98088, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 000000000000100348a4c645014ce4feb203dad0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 117.852µs} 2025/04/30 10:10:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:02 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [0] 2025/04/30 10:10:02 client updated RTT: 33.805ms (σ: 12.741ms) 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:02 client -> Sending packet 2 (42 bytes) for connection d828b790e6a656f4674f7e22d9d98088, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 000000000000100348a4c645014ce4feb203dad0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:02 client Connection d828b790e6a656f4674f7e22d9d98088 closed. 2025/04/30 10:10:02 Requesting https://server4:443/zgfhqhnmyn. 2025/04/30 10:10:02 Increased receive buffer size to 14336 kiB 2025/04/30 10:10:02 Increased send buffer size to 14336 kiB 2025/04/30 10:10:02 Setting DF for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:10:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:10:02 Created qlog file: /logs/qlog/a4edeac4579d4ed6fc2190f5098005ad.sqlog 2025/04/30 10:10:02 client Starting new connection to server4 ([::]:58280 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a4edeac4579d4ed6fc2190f5098005ad, version v1 2025/04/30 10:10:02 Adding connection ID (empty). 2025/04/30 10:10:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:10:02 client -> Sending packet 0 (1280 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: a4edeac4579d4ed6fc2190f5098005ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:10:02 client -> Sending packet 1 (1280 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: a4edeac4579d4ed6fc2190f5098005ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:02 client -> Sending packet 2 (1280 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad, Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: a4edeac4579d4ed6fc2190f5098005ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:10:02 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00000000000010031580642418fa1e1e28ce55e7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:10:02 client Received first packet. Switching destination connection ID to: 00000000000010031580642418fa1e1e28ce55e7 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [2] 2025/04/30 10:10:02 client updated RTT: 35.044517ms (σ: 17.522258ms) 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:10:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:10:02 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00000000000010031580642418fa1e1e28ce55e7, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:10:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 10:10:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:10:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a4edeac4579d4ed6fc2190f5098005ad, InitialSourceConnectionID: 00000000000010031580642418fa1e1e28ce55e7, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x79e4cd95101260272fd4ec93ab75c520} 2025/04/30 10:10:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad 2025/04/30 10:10:02 client Long Header{Type: Initial, DestConnectionID: 00000000000010031580642418fa1e1e28ce55e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 00000000000010031580642418fa1e1e28ce55e7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:10:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:10:02 client Dropping Initial keys. 2025/04/30 10:10:02 client -> Sending packet 1 (110 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad, Handshake 2025/04/30 10:10:02 client Long Header{Type: Handshake, DestConnectionID: 00000000000010031580642418fa1e1e28ce55e7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client Short Header{DestConnectionID: 00000000000010031580642418fa1e1e28ce55e7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:10:02 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:10:02 client Dropping Handshake keys. 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000001003cc0378821d2cd58ff4be0ec8, StatelessResetToken: 0x7303764ab32244783cd480b7e30080c9} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000001003a669c99cde28d1f3c156c26a, StatelessResetToken: 0x3c6d0c224e85a6a46b0d957fa3183cf3} 2025/04/30 10:10:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000001003b45a71ce3e80b5dc89199b4e, StatelessResetToken: 0x3a458256ed06290fb6c539967b0f842c} 2025/04/30 10:10:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:10:02 client -> Sending packet 1 (46 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 0000000000001003cc0378821d2cd58ff4be0ec8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 93.275µs} 2025/04/30 10:10:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:10:02 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:10:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:10:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:10:02 client newly acked packets (1): [0] 2025/04/30 10:10:02 client updated RTT: 34.869ms (σ: 13.49ms) 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:10:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:10:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:10:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:10:02 client -> Sending packet 2 (42 bytes) for connection a4edeac4579d4ed6fc2190f5098005ad, 1-RTT (ECN: ECT(0)) 2025/04/30 10:10:02 client Short Header{DestConnectionID: 0000000000001003cc0378821d2cd58ff4be0ec8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:10:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:10:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:10:02 client Connection a4edeac4579d4ed6fc2190f5098005ad closed.