2025/04/30 10:06:36 Requesting https://server4:443/ioohcxdbqj. 2025/04/30 10:06:36 Increased receive buffer size to 14336 kiB 2025/04/30 10:06:36 Increased send buffer size to 14336 kiB 2025/04/30 10:06:36 Setting DF for IPv4 and IPv6. 2025/04/30 10:06:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:06:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:06:36 Created qlog file: /logs/qlog/d184d922e33a502f508e4ebc.sqlog 2025/04/30 10:06:36 client Starting new connection to server4 ([::]:50434 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d184d922e33a502f508e4ebc, version v1 2025/04/30 10:06:36 Adding connection ID (empty). 2025/04/30 10:06:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:06:36 client -> Sending packet 0 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:36 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:06:36 client -> Sending packet 1 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:36 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:36 client -> Sending packet 2 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:36 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:06:37 client -> Sending packet 3 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:37 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:37 client -> Sending packet 4 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:37 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:06:38 client -> Sending packet 5 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:38 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:38 client -> Sending packet 6 (1280 bytes) for connection d184d922e33a502f508e4ebc, Initial 2025/04/30 10:06:38 client Long Header{Type: Initial, DestConnectionID: d184d922e33a502f508e4ebc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:38 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:06:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:06:38 client Received first packet. Switching destination connection ID to: 000000000000200159ab6f68259d14b4892cd5c3 2025/04/30 10:06:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:06:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:06:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:38 client <- Reading packet 0 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 0, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:06:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:06:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d184d922e33a502f508e4ebc, InitialSourceConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 8585216, MaxBidiStreamNum: 128, MaxUniStreamNum: 3, MaxIdleTimeout: 1m15s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2, StatelessResetToken: 0x0fc3d6066f332ab50cf0d1f520fc8e6a} 2025/04/30 10:06:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d184d922e33a502f508e4ebc 2025/04/30 10:06:38 client Long Header{Type: Initial, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:06:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:38 client Dropping Initial keys. 2025/04/30 10:06:38 client -> Sending packet 1 (110 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client Short Header{DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:06:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:38 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:38 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:38 client -> Sending packet 2 (52 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:38 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:38 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:38 client <- Reading packet 2 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 2, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:38 client -> Sending packet 3 (52 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:06:38 client -> Sending packet 4 (86 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:38 client -> Sending packet 5 (86 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:38 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:38 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:38 client <- Reading packet 3 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 3, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:38 client -> Sending packet 6 (52 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:38 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:38 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:06:38 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:38 client <- Reading packet 4 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 4, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:38 client -> Sending packet 7 (52 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:06:38 client -> Sending packet 8 (86 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:38 client -> Sending packet 9 (86 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:38 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:39 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:39 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:06:39 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:39 client <- Reading packet 5 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 5, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:39 client -> Sending packet 10 (52 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:39 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:39 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:39 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:06:39 client Dropping %!s(logging.PacketType=0) packet (146 bytes) because we already dropped the keys. 2025/04/30 10:06:39 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:06:39 client <- Reading packet 6 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:06:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, PacketNumber: 6, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:06:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 10:06:39 client -> Sending packet 11 (52 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:39 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:06:39 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:06:39 client -> Sending packet 12 (86 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:39 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:39 client -> Sending packet 13 (86 bytes) for connection d184d922e33a502f508e4ebc, Handshake 2025/04/30 10:06:39 client Long Header{Type: Handshake, DestConnectionID: 000000000000200159ab6f68259d14b4892cd5c3, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:06:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:06:39 client <- Reading packet 0 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:06:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:06:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:06:39 client Dropping Handshake keys. 2025/04/30 10:06:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0000000000002001afc8b91345687711bbb7c197, StatelessResetToken: 0x3b07d19702c17d1350d2699ae0bb03a7} 2025/04/30 10:06:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0000000000002001e37d2b23e0b3b3b0fbae9ba1, StatelessResetToken: 0xcf60b5e75ac7f150703db341a6b9eeb3} 2025/04/30 10:06:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0000000000002001c32c664f0240e23357941de2, StatelessResetToken: 0xebe87bf3166633b37d4fc4a7f16d01d0} 2025/04/30 10:06:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:06:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:06:39 client -> Sending packet 2 (65 bytes) for connection d184d922e33a502f508e4ebc, 1-RTT (ECN: ECT(0)) 2025/04/30 10:06:39 client Short Header{DestConnectionID: 0000000000002001afc8b91345687711bbb7c197, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:06:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 190.418µs} 2025/04/30 10:06:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:06:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:06:39 client -> Sending packet 3 (60 bytes) for connection d184d922e33a502f508e4ebc, 1-RTT (ECN: ECT(0)) 2025/04/30 10:06:39 client Short Header{DestConnectionID: 0000000000002001afc8b91345687711bbb7c197, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:06:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:06:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:06:39 client -> Sending packet 4 (1366 bytes) for connection d184d922e33a502f508e4ebc, 1-RTT (ECN: ECT(0)) 2025/04/30 10:06:39 client Short Header{DestConnectionID: 0000000000002001afc8b91345687711bbb7c197, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:06:39 client -> &wire.PingFrame{} 2025/04/30 10:06:39 client <- Reading packet 1 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:06:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:06:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:06:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:06:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 10:06:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:06:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:06:39 client -> Sending packet 5 (42 bytes) for connection d184d922e33a502f508e4ebc, 1-RTT (ECN: ECT(0)) 2025/04/30 10:06:39 client Short Header{DestConnectionID: 0000000000002001afc8b91345687711bbb7c197, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:06:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:06:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:06:39 client Connection d184d922e33a502f508e4ebc closed.