2025/09/12 03:54:44 Requesting https://server4:443/vpcfaxyzbn. 2025/09/12 03:54:44 Increased receive buffer size to 14336 kiB 2025/09/12 03:54:44 Increased send buffer size to 14336 kiB 2025/09/12 03:54:44 Setting DF for IPv4 and IPv6. 2025/09/12 03:54:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:54:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:54:44 Created qlog file: /logs/qlog/3ea797b7623c6b4c.sqlog 2025/09/12 03:54:44 client Starting new connection to server4 ([::]:34710 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ea797b7623c6b4c, version v1 2025/09/12 03:54:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:54:44 client -> Sending packet 0 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 3ea797b7623c6b4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:54:44 client -> Sending packet 1 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 3ea797b7623c6b4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:44 client <- Reading packet 21484277 (55 bytes) for connection (empty), Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, Token: (empty), PacketNumber: 21484277, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:54:44 client Received first packet. Switching destination connection ID to: 35b69a634f5d2db67902ec4b525744c289c9 2025/09/12 03:54:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:54:44 client newly acked packets (1): [0] 2025/09/12 03:54:44 client updated RTT: 37.586347ms (σ: 18.793173ms) 2025/09/12 03:54:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:54:44 client -> Sending packet 2 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:44 client -> Sending packet 3 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:54:44 client -> Sending packet 4 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client -> Sending packet 5 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:54:44 client -> Sending packet 6 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:44 client -> Sending packet 7 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:44 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:54:44 client -> &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 03:54:45 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/12 03:54:45 client <- Reading packet 21484278 (151 bytes) for connection (empty), Initial 2025/09/12 03:54:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, Token: (empty), PacketNumber: 21484278, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/12 03:54:45 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 03:54:45 client newly acked packets (1): [7] 2025/09/12 03:54:45 client updated RTT: 37.324ms (σ: 14.618ms) 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:54:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:54:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:54:45 client Parsed a coalesced packet. Part 2: 1049 bytes. Remaining: 0 bytes. 2025/09/12 03:54:45 client <- Reading packet 21484277 (1049 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484277, PacketNumberLen: 4, Length: 1020, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 996, Offset + Data length: 996} 2025/09/12 03:54:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ea797b7623c6b4c, InitialSourceConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd29c5fcc888fb32505f55646a9bd6dd8, EnableResetStreamAt: false} 2025/09/12 03:54:45 client -> Sending packet 8 (1280 bytes) for connection 3ea797b7623c6b4c, Initial 2025/09/12 03:54:45 client Long Header{Type: Initial, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484278, LowestAcked: 21484277, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client -> Sending packet 0 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484277, LowestAcked: 21484277, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client Dropping Initial keys. 2025/09/12 03:54:45 client <- Reading packet 21484278 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484278, PacketNumberLen: 4, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 996, Data length: 1146, Offset + Data length: 2142} 2025/09/12 03:54:45 client -> Sending packet 1 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484278, LowestAcked: 21484277, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484279 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484279, PacketNumberLen: 4, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 2142, Data length: 1146, Offset + Data length: 3288} 2025/09/12 03:54:45 client -> Sending packet 2 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484279, LowestAcked: 21484277, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484280 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484280, PacketNumberLen: 4, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 3288, Data length: 1146, Offset + Data length: 4434} 2025/09/12 03:54:45 client -> Sending packet 3 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484280, LowestAcked: 21484277, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484281 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484281, PacketNumberLen: 4, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 4434, Data length: 1146, Offset + Data length: 5580} 2025/09/12 03:54:45 client -> Sending packet 4 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484281, LowestAcked: 21484277, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484282 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484282, PacketNumberLen: 4, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 5580, Data length: 1146, Offset + Data length: 6726} 2025/09/12 03:54:45 client -> Sending packet 5 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484282, LowestAcked: 21484277, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484283 (425 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484283, PacketNumberLen: 4, Length: 396, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 6726, Data length: 371, Offset + Data length: 7097} 2025/09/12 03:54:45 client -> Sending packet 6 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484283, LowestAcked: 21484277, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484284 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484284, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 7097, Data length: 1149, Offset + Data length: 8246} 2025/09/12 03:54:45 client -> Sending packet 7 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484284, LowestAcked: 21484277, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484285 (1200 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484285, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 8246, Data length: 1149, Offset + Data length: 9395} 2025/09/12 03:54:45 client -> Sending packet 8 (56 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484285, LowestAcked: 21484277, DelayTime: 0s, ECT0: 9, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client Parsed a coalesced packet. Part 1: 604 bytes. Remaining: 596 bytes. 2025/09/12 03:54:45 client <- Reading packet 21484286 (604 bytes) for connection (empty), Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35b69a634f5d2db67902ec4b525744c289c9, PacketNumber: 21484286, PacketNumberLen: 1, Length: 575, Version: v1} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 9395, Data length: 553, Offset + Data length: 9948} 2025/09/12 03:54:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:54:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:54:45 client <- Reading packet 21484277 (596 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484277, PacketNumberLen: 4, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a7d59bf9a0b4c3381b8fa0e5e776aa39dec, StatelessResetToken: 0xb2bf31a7cca0ed3044839964004976eb} 2025/09/12 03:54:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 42181e18b04386fe5a4791ebc465df46571a, StatelessResetToken: 0x226047fd2648d8090e89bebaace51258} 2025/09/12 03:54:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, StatelessResetToken: 0x23359502d4ee861e970a3b4982277e83} 2025/09/12 03:54:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:54:45 client -> Sending packet 9 (153 bytes) for connection 3ea797b7623c6b4c, Handshake 2025/09/12 03:54:45 client Long Header{Type: Handshake, DestConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 68, Version: v1} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484286, LowestAcked: 21484277, DelayTime: 0s, ECT0: 10, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:54:45 client Short Header{DestConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:54:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:54:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:54:45 client -> Sending packet 1 (49 bytes) for connection 3ea797b7623c6b4c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:54:45 client Short Header{DestConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484277, LowestAcked: 21484277, DelayTime: 513.373µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484278 (1406 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484278, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.PingFrame{} 2025/09/12 03:54:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:54:45 client <- Reading packet 21484279 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484279, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c0482b30ce174360e4bc7727f88dae6aeaaf, StatelessResetToken: 0xee3d3ca34452dd077d2bf489dfaf0e4e} 2025/09/12 03:54:45 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:54:45 client Dropping Handshake keys. 2025/09/12 03:54:45 client <- &wire.NewTokenFrame{Token: 0x36d5384d331c5029b63d38c847c548f777009691f450c9f6ac395a9477b6021de928e51f5a751ab7cc} 2025/09/12 03:54:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/12 03:54:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/12 03:54:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:54:45 client -> Sending packet 2 (48 bytes) for connection 3ea797b7623c6b4c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:54:45 client Short Header{DestConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484279, LowestAcked: 21484277, DelayTime: 102.089µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484280 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484280, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 855, Data length: 1176, Offset + Data length: 2031} 2025/09/12 03:54:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:54:45 client <- Reading packet 21484281 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484281, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2031, Data length: 1176, Offset + Data length: 3207} 2025/09/12 03:54:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:54:45 client -> Sending packet 3 (48 bytes) for connection 3ea797b7623c6b4c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:54:45 client Short Header{DestConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:54:45 client -> &wire.AckFrame{LargestAcked: 21484281, LowestAcked: 21484277, DelayTime: 36.067µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client <- Reading packet 21484282 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484282, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3207, Data length: 1176, Offset + Data length: 4383} 2025/09/12 03:54:45 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:54:45 client <- Reading packet 21484283 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484283, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 4383, Data length: 737, Offset + Data length: 5120} 2025/09/12 03:54:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:54:45 client <- Reading packet 21484284 (40 bytes) for connection (empty), 1-RTT 2025/09/12 03:54:45 client Short Header{DestConnectionID: (empty), PacketNumber: 21484284, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:54:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.712ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:54:45 client newly acked packets (1): [0] 2025/09/12 03:54:45 client Canceling loss detection timer. 2025/09/12 03:54:45 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:54:45 client -> Sending packet 4 (40 bytes) for connection 3ea797b7623c6b4c, 1-RTT (ECN: ECT(0)) 2025/09/12 03:54:45 client Short Header{DestConnectionID: b4e008d673320315b68e2c7efa751b6fe3a0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:54:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:54:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:54:45 client Connection 3ea797b7623c6b4c closed.