2025-04-30 11:01:53,146 Generated random file: mjxseiqern of size: 10240 2025-04-30 11:01:53,146 Requests: https://server4:443/mjxseiqern 2025-04-30 11:01:53,206 2025-04-30 11:01:53,206 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_g8bp0o0q/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_8w_83zo8/ DOWNLOADS=/tmp/download_l9oqico2/ SERVER_LOGS=/tmp/logs_server__4sufa5z CLIENT_LOGS=/tmp/logs_client_z_sa9_wv SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=ghcr.io/ngtcp2/ngtcp2-interop:latest REQUESTS="https://server4:443/mjxseiqern" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 11:02:07,189 Container sim Created Container client Recreate Container server Recreate Container server Recreated Container client Recreated Attaching to client, server, sim sim | waiting 10s for server:443 server | Setting up routes... server | Actual changes: server | tx-checksum-ip-generic: off server | tx-tcp-segmentation: off [not requested] server | tx-tcp-ecn-segmentation: off [not requested] server | tx-tcp-mangleid-segmentation: off [not requested] server | tx-tcp6-segmentation: off [not requested] server | tx-udp-segmentation: off [not requested] server | tx-checksum-sctp: off client | Setting up routes... server | Endpoint's IPv4 address is 193.167.100.100 client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off client | Endpoint's IPv4 address is 193.167.0.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.005214279s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 01:55.377 Creating connection with server4:443 with v1 client | 01:55.457 Original destination connection id: d005040440912bf2 (scid: 86b1e5ddef71769b) client | >- CryptoStream[I|ClientHello] client | 01:55.603 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 01:55.641 <- (1) Packet I|-|R|139| Retry Token (90): b732ed3aeac4c4e0d3cfb52ffd681e211c18c81b8ccf1ee6a73c8e371d331d7c9af1175634924e5dcd09639e5605170a7b9e8c2375c1a06d04a6e8896dc640c77c483814265e36766448a215cde1f559cfd8cbec4aa012e692b9 client | 01:55.665 -> Packet I|1|L|1201|2 Token=b732ed3aeac4c4e0d3cfb52ffd681e211c18c81b8ccf1ee6a73c8e371d331d7c9af1175634924e5dcd09639e5605170a7b9e8c2375c1a06d04a6e8896dc640c77c483814265e36766448a215cde1f559cfd8cbec4aa012e692b9 CryptoFrame[0,257] Padding(796) client | 01:55.700 <- (2) Packet I|1632410074|L|190|2 Token=[] AckFrame[1|?0] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 01:55.728 -> Packet I|2|L|1202|2 Token=b732ed3aeac4c4e0d3cfb52ffd681e211c18c81b8ccf1ee6a73c8e371d331d7c9af1175634924e5dcd09639e5605170a7b9e8c2375c1a06d04a6e8896dc640c77c483814265e36766448a215cde1f559cfd8cbec4aa012e692b9 AckFrame[1632410074|?0] Padding(1046) client | 01:55.700 <- (2) Packet H|1632410074|L|799|1 CryptoFrame[0,738] client | 01:55.744 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) client | >- CryptoStream[H|Finished] client | 01:55.767 -> Packet H|0|L|90|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 01:55.769 -> Packet H|1|L|63|1 AckFrame[1632410074|?0] client | 01:55.700 <- (2) Packet A|1632410074|S0|86b1e5ddef71769b|211|2 NewConnectionIdFrame[1,<0|a17af7f84b13e03d4a4555c752ba1a57fb27|021b3fa85f4a4b0f0294dc1533c47314] Padding(144) client | 01:55.783 -> Packet A|0|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|70|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1632410074|?2] client | 01:55.802 <- (3) Packet A|1632410075|S0|86b1e5ddef71769b|1406|2 PingFrame[] Padding(1376) client | 01:55.803 <- (4) Packet A|1632410076|S0|86b1e5ddef71769b|1200|4 HandshakeDoneFrame[] NewTokenFrame[362e5511dceb8c5a84ad9a0cf128895ae271433405dabb1e823401943ddb67fdcebe7cd09b1a8d13f3] CryptoFrame[0,237] Padding(886) client | -< CryptoStream[A|NewSessionTicket] client | 01:55.806 -> Packet A|1|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|49|1 AckFrame[1632410076-1632410074|?3] client | 01:55.815 <- (5) Packet A|1632410077|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),0,1170] client | 01:55.816 <- (6) Packet A|1632410078|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),1170,1168] client | 01:55.817 <- (7) Packet A|1632410079|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),2338,1168] client | 01:55.818 -> Packet A|2|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|49|1 AckFrame[1632410078-1632410074|?1] client | 01:55.818 <- (8) Packet A|1632410080|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),3506,1168] client | 01:55.819 <- (9) Packet A|1632410081|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),4674,1168] client | 01:55.820 <- (10) Packet A|1632410082|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),5842,1168] client | 01:55.820 -> Packet A|3|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|49|1 AckFrame[1632410080-1632410074|?1] client | 01:55.821 <- (11) Packet A|1632410083|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),7010,1168] client | 01:55.822 -> Packet A|4|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|49|1 AckFrame[1632410082-1632410074|?1] client | 01:55.822 <- (12) Packet A|1632410084|S0|86b1e5ddef71769b|1200|1 StreamFrame[0(CIB),8178,1168] client | 01:55.823 <- (13) Packet A|1632410085|S0|86b1e5ddef71769b|1200|2 StreamFrame[0(CIB),9346,894,fin] Padding(274) client | 01:55.823 -> Packet A|5|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|48|1 AckFrame[1632410084-1632410074|?0] client | 01:55.824 <- (14) Packet A|1632410086|S0|86b1e5ddef71769b|40|2 AckFrame[0|?8] Padding(8) client | Get requested finished in 0.37 sec (0.03 MB/s) : tech.kwik.h09.client.HttpResponseImpl@2ddc8ecb client | 01:55.831 Closing ClientConnection[d005040440912bf2/86b1e5ddef71769b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 01:55.833 -> Packet A|6|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|53|2 ConnectionCloseFrame[0|0|] AckFrame[1632410086-1632410075|?9] client | 01:55.839 <- (15) Packet A|1632410087|S0|86b1e5ddef71769b|1444|2 PingFrame[] Padding(1417) client | 01:55.840 -> Packet A|7|S0|4b6d7674f3f49cb1dc36a2e3a06b057acdd3|52|2 ConnectionCloseFrame[0|0|] AckFrame[1632410086-1632410075|?0] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 11:02:07,286 Using the server's key log file. 2025-04-30 11:02:07,294 2025-04-30 11:02:07,295 Using the server's key log file. 2025-04-30 11:02:07,295 Using the server's key log file. 2025-04-30 11:02:07,302 2025-04-30 11:02:07,302 Using the server's key log file. 2025-04-30 11:02:07,865 Check of downloaded files succeeded. 2025-04-30 11:02:08,421 Check of Retry succeeded. Token used: b732ed3aeac4c4e0d3cfb52ffd681e211c18c81b8ccf1ee6a73c8e371d331d7c9af1175634924e5dcd09639e5605170a7b9e8c2375c1a06d04a6e8896dc640c77c483814265e36766448a215cde1f559cfd8cbec4aa012e692b9