2025/09/11 16:57:15 Requesting https://server4:443/meyiubminx. 2025/09/11 16:57:15 Increased receive buffer size to 14336 kiB 2025/09/11 16:57:15 Increased send buffer size to 14336 kiB 2025/09/11 16:57:15 Setting DF for IPv4 and IPv6. 2025/09/11 16:57:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 16:57:15 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 16:57:15 Created qlog file: /logs/qlog/2567174151958e62affef3f9c5a5b1d992836b.sqlog 2025/09/11 16:57:15 client Starting new connection to server4 ([::]:37762 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2567174151958e62affef3f9c5a5b1d992836b, version v1 2025/09/11 16:57:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 16:57:15 client -> Sending packet 0 (1280 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b, Initial 2025/09/11 16:57:15 client Long Header{Type: Initial, DestConnectionID: 2567174151958e62affef3f9c5a5b1d992836b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 16:57:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 16:57:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 16:57:15 client -> Sending packet 1 (1280 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b, Initial 2025/09/11 16:57:15 client Long Header{Type: Initial, DestConnectionID: 2567174151958e62affef3f9c5a5b1d992836b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 16:57:15 client -> &wire.CryptoFrame{Offset: 1229, Data length: 279, Offset + Data length: 1508} 2025/09/11 16:57:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 16:57:16 client <- Reading packet 1812904240 (55 bytes) for connection (empty), Initial 2025/09/11 16:57:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c3c6287ef17d18b3e67ad2ac0497f3cc200, Token: (empty), PacketNumber: 1812904240, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 16:57:16 client Received first packet. Switching destination connection ID to: 1c3c6287ef17d18b3e67ad2ac0497f3cc200 2025/09/11 16:57:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 16:57:16 client newly acked packets (1): [0] 2025/09/11 16:57:16 client updated RTT: 37.487587ms (σ: 18.743793ms) 2025/09/11 16:57:16 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 16:57:16 client <- Reading packet 1812904241 (149 bytes) for connection (empty), Initial 2025/09/11 16:57:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c3c6287ef17d18b3e67ad2ac0497f3cc200, Token: (empty), PacketNumber: 1812904241, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 16:57:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 16:57:16 client newly acked packets (1): [1] 2025/09/11 16:57:16 client updated RTT: 37.779ms (σ: 14.642ms) 2025/09/11 16:57:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 16:57:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 16:57:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 16:57:16 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 284 bytes. 2025/09/11 16:57:16 client <- Reading packet 1812904240 (767 bytes) for connection (empty), Handshake 2025/09/11 16:57:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c3c6287ef17d18b3e67ad2ac0497f3cc200, PacketNumber: 1812904240, PacketNumberLen: 4, Length: 738, Version: v1} 2025/09/11 16:57:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/11 16:57:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 16:57:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 16:57:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2567174151958e62affef3f9c5a5b1d992836b, InitialSourceConnectionID: 1c3c6287ef17d18b3e67ad2ac0497f3cc200, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x28a995e9fe187d2642eeb918283380fd, EnableResetStreamAt: false} 2025/09/11 16:57:16 client <- Reading packet 1812904240 (284 bytes) for connection (empty), 1-RTT 2025/09/11 16:57:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1812904240, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 16:57:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4d4f019871768497c283b61af0aa86537f7, StatelessResetToken: 0x0aec5cb1ba726f3fa9fcdc46d77b6284} 2025/09/11 16:57:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2399aed16ab77cd7c70299af6775f5abdfd4, StatelessResetToken: 0x84670fb03044eb1df26163c860963b57} 2025/09/11 16:57:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, StatelessResetToken: 0xeedfd07f687dab3e457ae03e6e3bfe72} 2025/09/11 16:57:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 16:57:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b 2025/09/11 16:57:16 client Long Header{Type: Initial, DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 16:57:16 client -> &wire.AckFrame{LargestAcked: 1812904241, LowestAcked: 1812904240, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 16:57:16 client Long Header{Type: Handshake, DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 16:57:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 16:57:16 client Short Header{DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 16:57:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 16:57:16 client Dropping Initial keys. 2025/09/11 16:57:16 client -> Sending packet 1 (116 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b, Handshake 2025/09/11 16:57:16 client Long Header{Type: Handshake, DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 16:57:16 client -> &wire.AckFrame{LargestAcked: 1812904240, LowestAcked: 1812904240, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 16:57:16 client Short Header{DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 16:57:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 16:57:16 client -> Sending packet 2 (53 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b, 1-RTT (ECN: ECT(0)) 2025/09/11 16:57:16 client Short Header{DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 16:57:16 client -> &wire.AckFrame{LargestAcked: 1812904240, LowestAcked: 1812904240, DelayTime: 1.011829ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 16:57:16 client <- Reading packet 1812904241 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 16:57:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1812904241, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 16:57:16 client <- &wire.PingFrame{} 2025/09/11 16:57:16 client Setting ACK timer to max ack delay: 25ms 2025/09/11 16:57:16 client <- Reading packet 1812904242 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 16:57:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1812904242, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 16:57:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 160µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 16:57:16 client Peer doesn't await address validation any longer. 2025/09/11 16:57:16 client newly acked packets (2): [0 1] 2025/09/11 16:57:16 client Canceling loss detection timer. 2025/09/11 16:57:16 client Dropping Handshake keys. 2025/09/11 16:57:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9774244ffa14e1a08675d1bc0f28bcbca476, StatelessResetToken: 0x7746bf96dd1a98847c4fe054b4131bf4} 2025/09/11 16:57:16 client <- &wire.HandshakeDoneFrame{} 2025/09/11 16:57:16 client <- &wire.NewTokenFrame{Token: 0x36d3305e5a7cfd0e8dc939d78ab22bec8174d6ccc87863228966885c01132d0cebbf32e8d6844879e6} 2025/09/11 16:57:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 16:57:16 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 16:57:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 16:57:16 client -> Sending packet 3 (52 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b, 1-RTT (ECN: ECT(0)) 2025/09/11 16:57:16 client Short Header{DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 16:57:16 client -> &wire.AckFrame{LargestAcked: 1812904242, LowestAcked: 1812904240, DelayTime: 128.732µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 16:57:16 client <- Reading packet 1812904243 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 16:57:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1812904243, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 16:57:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 16:57:16 client Setting ACK timer to max ack delay: 25ms 2025/09/11 16:57:16 client Closing connection with error: Application error 0x0 (local) 2025/09/11 16:57:16 client -> Sending packet 4 (40 bytes) for connection 2567174151958e62affef3f9c5a5b1d992836b, 1-RTT (ECN: ECT(0)) 2025/09/11 16:57:16 client Short Header{DestConnectionID: 41bbcf5b1cdf252370d9e0b6f1f23d5afda9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 16:57:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 16:57:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 16:57:16 client Connection 2567174151958e62affef3f9c5a5b1d992836b closed.