2025/09/11 17:01:42 Requesting https://server4:443/qmwkwyutvg. 2025/09/11 17:01:42 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:42 Increased send buffer size to 14336 kiB 2025/09/11 17:01:42 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:42 Created qlog file: /logs/qlog/0a6b761e512d7ccb9c.sqlog 2025/09/11 17:01:42 client Starting new connection to server4 ([::]:49489 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0a6b761e512d7ccb9c, version v1 2025/09/11 17:01:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:42 client -> Sending packet 0 (1280 bytes) for connection 0a6b761e512d7ccb9c, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: 0a6b761e512d7ccb9c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:42 client -> Sending packet 1 (1280 bytes) for connection 0a6b761e512d7ccb9c, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: 0a6b761e512d7ccb9c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:42 client <- Reading packet 810215889 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, Token: (empty), PacketNumber: 810215889, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:42 client Received first packet. Switching destination connection ID to: ec3d200b223e43ca4eae2e7a3e023df8fbc4 2025/09/11 17:01:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:42 client newly acked packets (1): [0] 2025/09/11 17:01:42 client updated RTT: 37.476937ms (σ: 18.738468ms) 2025/09/11 17:01:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:42 client -> Sending packet 2 (1280 bytes) for connection 0a6b761e512d7ccb9c, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/11 17:01:42 client -> Sending packet 3 (1280 bytes) for connection 0a6b761e512d7ccb9c, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:42 client -> Sending packet 4 (1280 bytes) for connection 0a6b761e512d7ccb9c, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:42 client -> Sending packet 5 (1280 bytes) for connection 0a6b761e512d7ccb9c, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 1239, Data length: 265, Offset + Data length: 1504} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:42 client <- Reading packet 810215892 (57 bytes) for connection (empty), Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, Token: (empty), PacketNumber: 810215892, PacketNumberLen: 4, Length: 27, Version: v1} 2025/09/11 17:01:42 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:42 client <- Reading packet 810215893 (57 bytes) for connection (empty), Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, Token: (empty), PacketNumber: 810215893, PacketNumberLen: 4, Length: 27, Version: v1} 2025/09/11 17:01:42 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:42 client newly acked packets (1): [5] 2025/09/11 17:01:42 client updated RTT: 36.902ms (σ: 15.2ms) 2025/09/11 17:01:42 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/09/11 17:01:42 client <- Reading packet 810215894 (144 bytes) for connection (empty), Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, Token: (empty), PacketNumber: 810215894, PacketNumberLen: 4, Length: 114, Version: v1} 2025/09/11 17:01:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:42 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 298 bytes. 2025/09/11 17:01:42 client <- Reading packet 810215891 (758 bytes) for connection (empty), Handshake 2025/09/11 17:01:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, PacketNumber: 810215891, PacketNumberLen: 4, Length: 729, Version: v1} 2025/09/11 17:01:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/09/11 17:01:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0a6b761e512d7ccb9c, InitialSourceConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x170cf0408825b1c5ca76f7c34a8af9b3, EnableResetStreamAt: false} 2025/09/11 17:01:42 client <- Reading packet 810215891 (298 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:42 client Short Header{DestConnectionID: (empty), PacketNumber: 810215891, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:42 client <- &wire.PingFrame{} 2025/09/11 17:01:42 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0a6b761e512d7ccb9c 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:42 client -> &wire.AckFrame{LargestAcked: 810215894, LowestAcked: 810215889, AckRanges: {{Largest: 810215894, Smallest: 810215892}, {Largest: 810215889, Smallest: 810215889}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:42 client Long Header{Type: Handshake, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:42 client Dropping Initial keys. 2025/09/11 17:01:42 client -> Sending packet 1 (56 bytes) for connection 0a6b761e512d7ccb9c, Handshake 2025/09/11 17:01:42 client Long Header{Type: Handshake, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:42 client -> &wire.AckFrame{LargestAcked: 810215891, LowestAcked: 810215891, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:42 client -> Sending packet 0 (68 bytes) for connection 0a6b761e512d7ccb9c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:42 client Short Header{DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:42 client -> &wire.AckFrame{LargestAcked: 810215891, LowestAcked: 810215891, DelayTime: 857.245µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:42 client -> Sending packet 2 (84 bytes) for connection 0a6b761e512d7ccb9c, Handshake 2025/09/11 17:01:42 client Long Header{Type: Handshake, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:42 client -> Sending packet 3 (84 bytes) for connection 0a6b761e512d7ccb9c, Handshake 2025/09/11 17:01:42 client Long Header{Type: Handshake, DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:42 client <- Reading packet 810215894 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:42 client Short Header{DestConnectionID: (empty), PacketNumber: 810215894, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 770, Data length: 254, Offset + Data length: 1024} 2025/09/11 17:01:42 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:42 client -> Sending packet 1 (50 bytes) for connection 0a6b761e512d7ccb9c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:42 client Short Header{DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:42 client -> &wire.AckFrame{LargestAcked: 810215894, LowestAcked: 810215891, AckRanges: {{Largest: 810215894, Smallest: 810215894}, {Largest: 810215891, Smallest: 810215891}}, DelayTime: 85.95µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:42 client <- Reading packet 810215896 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:42 client Short Header{DestConnectionID: (empty), PacketNumber: 810215896, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:42 client <- &wire.PingFrame{} 2025/09/11 17:01:42 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:42 client -> Sending packet 2 (52 bytes) for connection 0a6b761e512d7ccb9c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:42 client Short Header{DestConnectionID: ec3d200b223e43ca4eae2e7a3e023df8fbc4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:42 client -> &wire.AckFrame{LargestAcked: 810215896, LowestAcked: 810215891, AckRanges: {{Largest: 810215896, Smallest: 810215896}, {Largest: 810215894, Smallest: 810215894}, {Largest: 810215891, Smallest: 810215891}}, DelayTime: 69.951µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:42 client <- Reading packet 810215897 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:42 client Short Header{DestConnectionID: (empty), PacketNumber: 810215897, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:42 client <- &wire.PingFrame{} 2025/09/11 17:01:42 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:42 client <- Reading packet 810215898 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:42 client Short Header{DestConnectionID: (empty), PacketNumber: 810215898, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:42 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:42 client Dropping Handshake keys. 2025/09/11 17:01:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 94dd989db4ccb52e44965cde9ddf4b442c83, StatelessResetToken: 0x4c58df1fd32a5a6737bb0eeac8086653} 2025/09/11 17:01:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 658574bc7c06c0b6f221f443f9c9798b2b7d, StatelessResetToken: 0x4e8d7e4e29db2f3ef34c57655df92431} 2025/09/11 17:01:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04584a9d466961685b606c69ad2fc4954ff0, StatelessResetToken: 0xec9fa50f31c7bc1f4c7551da5ba69b03} 2025/09/11 17:01:42 client <- &wire.NewTokenFrame{Token: 0x3649535686ada8319f4c713fb09c856431403c4cd1db34d7b0ffd1886875a5ad589071fc77cec4b8b4} 2025/09/11 17:01:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 770, Offset + Data length: 770} 2025/09/11 17:01:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:42 client -> Sending packet 4 (73 bytes) for connection 0a6b761e512d7ccb9c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:42 client Short Header{DestConnectionID: 04584a9d466961685b606c69ad2fc4954ff0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:42 client -> &wire.AckFrame{LargestAcked: 810215898, LowestAcked: 810215891, AckRanges: {{Largest: 810215898, Smallest: 810215896}, {Largest: 810215894, Smallest: 810215894}, {Largest: 810215891, Smallest: 810215891}}, DelayTime: 144.16µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:42 client -> Sending packet 5 (58 bytes) for connection 0a6b761e512d7ccb9c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:42 client Short Header{DestConnectionID: 04584a9d466961685b606c69ad2fc4954ff0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:42 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:42 client -> Sending packet 6 (40 bytes) for connection 0a6b761e512d7ccb9c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:42 client Short Header{DestConnectionID: 04584a9d466961685b606c69ad2fc4954ff0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:42 client Connection 0a6b761e512d7ccb9c closed. 2025/09/11 17:01:42 Requesting https://server4:443/zjnygnbfry. 2025/09/11 17:01:42 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:42 Increased send buffer size to 14336 kiB 2025/09/11 17:01:42 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:42 Created qlog file: /logs/qlog/a146c30961ba48efe76ecf260cf3a327.sqlog 2025/09/11 17:01:42 client Starting new connection to server4 ([::]:57940 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a146c30961ba48efe76ecf260cf3a327, version v1 2025/09/11 17:01:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:42 client -> Sending packet 0 (1280 bytes) for connection a146c30961ba48efe76ecf260cf3a327, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: a146c30961ba48efe76ecf260cf3a327, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:42 client -> Sending packet 1 (1280 bytes) for connection a146c30961ba48efe76ecf260cf3a327, Initial 2025/09/11 17:01:42 client Long Header{Type: Initial, DestConnectionID: a146c30961ba48efe76ecf260cf3a327, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:42 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/09/11 17:01:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:43 client -> Sending packet 2 (1280 bytes) for connection a146c30961ba48efe76ecf260cf3a327, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: a146c30961ba48efe76ecf260cf3a327, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:43 client -> Sending packet 3 (1280 bytes) for connection a146c30961ba48efe76ecf260cf3a327, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: a146c30961ba48efe76ecf260cf3a327, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/09/11 17:01:43 client <- Reading packet 1726389668 (1200 bytes) for connection (empty), Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, Token: (empty), PacketNumber: 1726389668, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/09/11 17:01:43 client Received first packet. Switching destination connection ID to: 79bf4d078e3548f4cc6477ee78a6f8aa49ae 2025/09/11 17:01:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:43 client newly acked packets (1): [2] 2025/09/11 17:01:43 client updated RTT: 32.774667ms (σ: 16.387333ms) 2025/09/11 17:01:43 client <- &wire.PingFrame{} 2025/09/11 17:01:43 client -> Sending packet 4 (1280 bytes) for connection a146c30961ba48efe76ecf260cf3a327, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389668, LowestAcked: 1726389668, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:43 client Parsed a coalesced packet. Part 1: 141 bytes. Remaining: 1059 bytes. 2025/09/11 17:01:43 client <- Reading packet 1726389670 (141 bytes) for connection (empty), Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, Token: (empty), PacketNumber: 1726389670, PacketNumberLen: 1, Length: 111, Version: v1} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 294 bytes. 2025/09/11 17:01:43 client <- Reading packet 1726389668 (765 bytes) for connection (empty), Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, PacketNumber: 1726389668, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/11 17:01:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a146c30961ba48efe76ecf260cf3a327, InitialSourceConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x64c5698f12a3551bb21b6ae0e1525546, EnableResetStreamAt: false} 2025/09/11 17:01:43 client <- Reading packet 1726389668 (294 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389668, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a146c30961ba48efe76ecf260cf3a327 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389670, LowestAcked: 1726389668, AckRanges: {{Largest: 1726389670, Smallest: 1726389670}, {Largest: 1726389668, Smallest: 1726389668}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:43 client Dropping Initial keys. 2025/09/11 17:01:43 client -> Sending packet 1 (116 bytes) for connection a146c30961ba48efe76ecf260cf3a327, Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389668, LowestAcked: 1726389668, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Short Header{DestConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:43 client <- Reading packet 1726389670 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389670, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:43 client Dropping Handshake keys. 2025/09/11 17:01:43 client <- &wire.NewTokenFrame{Token: 0x36faf6d996c58cd6e28a920430fd91878aa7726fab92129874f7546f0cf9e0c7eaeb5fd926e2adeadb} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:43 client -> Sending packet 1 (54 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 79bf4d078e3548f4cc6477ee78a6f8aa49ae, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389670, LowestAcked: 1726389668, AckRanges: {{Largest: 1726389670, Smallest: 1726389670}, {Largest: 1726389668, Smallest: 1726389668}}, DelayTime: 98.965µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client <- Reading packet 1726389671 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389671, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bd21b91dc19039dab1fe3bce515bf0c6725, StatelessResetToken: 0xebd350b1acbd115da23b4abfbc0f367d} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 52a32b25c1de8dcb87bb010a2543c0d87ec5, StatelessResetToken: 0x9d0a99e889dc3024b1886ddd80acd9df} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, StatelessResetToken: 0x74ddba586d2326727ab328a9a475ce62} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client -> Sending packet 2 (56 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389671, LowestAcked: 1726389668, AckRanges: {{Largest: 1726389671, Smallest: 1726389670}, {Largest: 1726389668, Smallest: 1726389668}}, DelayTime: 72.916µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:43 client <- Reading packet 1726389672 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389672, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8142c3c564b67629d5ac1caa081fcebf1ac3, StatelessResetToken: 0xc02b99b6fcedb37272dbedecb585d6d2} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:43 client -> Sending packet 3 (55 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389672, LowestAcked: 1726389668, AckRanges: {{Largest: 1726389672, Smallest: 1726389670}, {Largest: 1726389668, Smallest: 1726389668}}, DelayTime: 25.269009ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client <- Reading packet 1726389674 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389674, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.PingFrame{} 2025/09/11 17:01:43 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:43 client -> Sending packet 4 (56 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389674, LowestAcked: 1726389668, AckRanges: {{Largest: 1726389674, Smallest: 1726389674}, {Largest: 1726389672, Smallest: 1726389670}, {Largest: 1726389668, Smallest: 1726389668}}, DelayTime: 119.935µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:43 client -> Sending packet 6 (56 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:43 client Skipping packet number 5 2025/09/11 17:01:43 client -> Sending packet 7 (39 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:43 client <- Reading packet 1726389675 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389675, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.PingFrame{} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client <- Reading packet 1726389676 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1726389676, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 1}}, DelayTime: 104µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client newly acked packets (2): [6 7] 2025/09/11 17:01:43 client updated RTT: 32.717ms (σ: 12.403ms) 2025/09/11 17:01:43 client ECN capability confirmed. 2025/09/11 17:01:43 client Canceling loss detection timer. 2025/09/11 17:01:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:43 client -> Sending packet 8 (56 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1726389676, LowestAcked: 1726389668, AckRanges: {{Largest: 1726389676, Smallest: 1726389674}, {Largest: 1726389672, Smallest: 1726389670}, {Largest: 1726389668, Smallest: 1726389668}}, DelayTime: 117.65µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:43 client -> Sending packet 9 (40 bytes) for connection a146c30961ba48efe76ecf260cf3a327, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 4ae49c76937d73019ef6386b674ad26835eb, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:43 client Connection a146c30961ba48efe76ecf260cf3a327 closed. 2025/09/11 17:01:43 Requesting https://server4:443/amwvvwmwwe. 2025/09/11 17:01:43 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:43 Increased send buffer size to 14336 kiB 2025/09/11 17:01:43 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:43 Created qlog file: /logs/qlog/800e2f211d8003c6825aadcd451b2e74ab62.sqlog 2025/09/11 17:01:43 client Starting new connection to server4 ([::]:55366 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 800e2f211d8003c6825aadcd451b2e74ab62, version v1 2025/09/11 17:01:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:43 client -> Sending packet 0 (1280 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 800e2f211d8003c6825aadcd451b2e74ab62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/11 17:01:43 client -> Sending packet 1 (1280 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 800e2f211d8003c6825aadcd451b2e74ab62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 1230, Data length: 287, Offset + Data length: 1517} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:43 client -> Sending packet 2 (1280 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 800e2f211d8003c6825aadcd451b2e74ab62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/11 17:01:43 client -> Sending packet 3 (1280 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 800e2f211d8003c6825aadcd451b2e74ab62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 1230, Data length: 287, Offset + Data length: 1517} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:43 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:43 client <- Reading packet 92022675 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a90bd51d3c6e19966cdad0e5f952e0e2d8ad, Token: (empty), PacketNumber: 92022675, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:43 client Received first packet. Switching destination connection ID to: a90bd51d3c6e19966cdad0e5f952e0e2d8ad 2025/09/11 17:01:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:43 client newly acked packets (1): [3] 2025/09/11 17:01:43 client updated RTT: 34.759442ms (σ: 17.379721ms) 2025/09/11 17:01:43 client setting loss timer for packet 2 (Initial) to 39.104372ms (in 2025-09-11 17:01:43.58807535 +0000 UTC m=+1.492459431) 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 282 bytes. 2025/09/11 17:01:43 client <- Reading packet 92022674 (767 bytes) for connection (empty), Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a90bd51d3c6e19966cdad0e5f952e0e2d8ad, PacketNumber: 92022674, PacketNumberLen: 4, Length: 738, Version: v1} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/11 17:01:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 800e2f211d8003c6825aadcd451b2e74ab62, InitialSourceConnectionID: a90bd51d3c6e19966cdad0e5f952e0e2d8ad, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x49187bf7e7b0b7877d2bb611660b5d0b, EnableResetStreamAt: false} 2025/09/11 17:01:43 client <- Reading packet 92022674 (282 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 92022674, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f200d98f172c6cc6dfa4131660db4dd2994f, StatelessResetToken: 0xc03213d99e86b1ba3f400f0cb3317489} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ccd9ffaf5035e4b7411abd2b8e9a16247600, StatelessResetToken: 0x2d2fbd7223279559707fba10e9c02408} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, StatelessResetToken: 0x2407d52771dd5453ce28ccd92b4c7335} 2025/09/11 17:01:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 92022675, LowestAcked: 92022675, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:43 client Short Header{DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:43 client Dropping Initial keys. 2025/09/11 17:01:43 client -> Sending packet 1 (56 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 92022674, LowestAcked: 92022674, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client -> Sending packet 1 (49 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 92022674, LowestAcked: 92022674, DelayTime: 845.704µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:43 client <- Reading packet 92022676 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 92022676, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d63053552dc9990082211058fd9675116241, StatelessResetToken: 0x067b70e828f6e0de775a6572b4cd9b7e} 2025/09/11 17:01:43 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:43 client Dropping Handshake keys. 2025/09/11 17:01:43 client <- &wire.NewTokenFrame{Token: 0x3695166fc0baba31e237589573ead866c0ca8a3a6f46706ee1b230fde7c4bbe20ab7a1fd701820b4ef} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:43 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:43 client -> Sending packet 2 (50 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 92022676, LowestAcked: 92022674, AckRanges: {{Largest: 92022676, Smallest: 92022676}, {Largest: 92022674, Smallest: 92022674}}, DelayTime: 121.618µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client <- Reading packet 92022677 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 92022677, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:43 client -> Sending packet 3 (40 bytes) for connection 800e2f211d8003c6825aadcd451b2e74ab62, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: b777ede8a27ba9d1821bdd837fa5b7f42e07, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:43 client Connection 800e2f211d8003c6825aadcd451b2e74ab62 closed. 2025/09/11 17:01:43 Requesting https://server4:443/cfafnvbxfu. 2025/09/11 17:01:43 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:43 Increased send buffer size to 14336 kiB 2025/09/11 17:01:43 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:43 Created qlog file: /logs/qlog/da09678da3b8964630250f5d.sqlog 2025/09/11 17:01:43 client Starting new connection to server4 ([::]:33561 -> 193.167.100.100:443), source connection ID (empty), destination connection ID da09678da3b8964630250f5d, version v1 2025/09/11 17:01:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:43 client -> Sending packet 0 (1280 bytes) for connection da09678da3b8964630250f5d, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: da09678da3b8964630250f5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/11 17:01:43 client -> Sending packet 1 (1280 bytes) for connection da09678da3b8964630250f5d, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: da09678da3b8964630250f5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 1236, Data length: 283, Offset + Data length: 1519} 2025/09/11 17:01:43 client <- Reading packet 1002423200 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d56e8a560194e4f9a362fd9f5475063a1f02, Token: (empty), PacketNumber: 1002423200, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:43 client Received first packet. Switching destination connection ID to: d56e8a560194e4f9a362fd9f5475063a1f02 2025/09/11 17:01:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:43 client newly acked packets (1): [0] 2025/09/11 17:01:43 client updated RTT: 32.067062ms (σ: 16.033531ms) 2025/09/11 17:01:43 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:43 client <- Reading packet 1002423201 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d56e8a560194e4f9a362fd9f5475063a1f02, Token: (empty), PacketNumber: 1002423201, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:43 client newly acked packets (1): [1] 2025/09/11 17:01:43 client updated RTT: 32.381ms (σ: 12.653ms) 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 290 bytes. 2025/09/11 17:01:43 client <- Reading packet 1002423200 (761 bytes) for connection (empty), Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d56e8a560194e4f9a362fd9f5475063a1f02, PacketNumber: 1002423200, PacketNumberLen: 4, Length: 732, Version: v1} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/11 17:01:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: da09678da3b8964630250f5d, InitialSourceConnectionID: d56e8a560194e4f9a362fd9f5475063a1f02, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x81d897447eb8d23329e3b3d67ea11a7d, EnableResetStreamAt: false} 2025/09/11 17:01:43 client <- Reading packet 1002423200 (290 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1002423200, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 428c402de1e6619e9e19b2d03cc91364d996, StatelessResetToken: 0xac95201beac3c95ced0916a22a1c08cc} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06528cd72aeaf23b61798302252026dd5437, StatelessResetToken: 0xe9e405ad791b006228caa94162cb57fb} 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, StatelessResetToken: 0xcf0b24ca7389be5d81fd59ae09a0729c} 2025/09/11 17:01:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection da09678da3b8964630250f5d 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1002423201, LowestAcked: 1002423200, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:43 client Dropping Initial keys. 2025/09/11 17:01:43 client -> Sending packet 1 (112 bytes) for connection da09678da3b8964630250f5d, Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1002423200, LowestAcked: 1002423200, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:43 client -> Sending packet 2 (49 bytes) for connection da09678da3b8964630250f5d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1002423200, LowestAcked: 1002423200, DelayTime: 766.616µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:43 client -> Sending packet 2 (84 bytes) for connection da09678da3b8964630250f5d, Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:43 client -> Sending packet 3 (84 bytes) for connection da09678da3b8964630250f5d, Handshake 2025/09/11 17:01:43 client Long Header{Type: Handshake, DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:43 client <- Reading packet 1002423201 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1002423201, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.PingFrame{} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:43 client -> Sending packet 3 (49 bytes) for connection da09678da3b8964630250f5d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1002423201, LowestAcked: 1002423200, DelayTime: 25.265222ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client <- Reading packet 1002423203 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1002423203, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.PingFrame{} 2025/09/11 17:01:43 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:43 client -> Sending packet 4 (50 bytes) for connection da09678da3b8964630250f5d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1002423203, LowestAcked: 1002423200, AckRanges: {{Largest: 1002423203, Smallest: 1002423203}, {Largest: 1002423201, Smallest: 1002423200}}, DelayTime: 77.957µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client <- Reading packet 1002423204 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1002423204, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:43 client Dropping Handshake keys. 2025/09/11 17:01:43 client <- &wire.NewTokenFrame{Token: 0x36d7800afcb5b75f7d3c0b94605d451c5d516923728c1a1ebcd0209aa4563d4ed7289904a957d30c2f} 2025/09/11 17:01:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:43 client -> Sending packet 6 (52 bytes) for connection da09678da3b8964630250f5d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.AckFrame{LargestAcked: 1002423204, LowestAcked: 1002423200, AckRanges: {{Largest: 1002423204, Smallest: 1002423203}, {Largest: 1002423201, Smallest: 1002423200}}, DelayTime: 91.481µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:43 client Skipping packet number 5 2025/09/11 17:01:43 client -> Sending packet 7 (56 bytes) for connection da09678da3b8964630250f5d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:43 client <- Reading packet 1002423205 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1002423205, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:43 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 128µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:43 client newly acked packets (2): [6 7] 2025/09/11 17:01:43 client updated RTT: 32.344ms (σ: 9.563ms) 2025/09/11 17:01:43 client ECN capability confirmed. 2025/09/11 17:01:43 client Canceling loss detection timer. 2025/09/11 17:01:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 24fc6a93b25f22c718139e55b9603ae24183, StatelessResetToken: 0xcd839bebd702d274ee24cbc118eaea89} 2025/09/11 17:01:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:43 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:43 client Ignoring all packets below 1002423205. 2025/09/11 17:01:43 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:43 client -> Sending packet 8 (40 bytes) for connection da09678da3b8964630250f5d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:43 client Short Header{DestConnectionID: 98998e3ff72cfc7284d5319e024a36e4febe, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:43 client Connection da09678da3b8964630250f5d closed. 2025/09/11 17:01:43 Requesting https://server4:443/stfhktdxxv. 2025/09/11 17:01:43 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:43 Increased send buffer size to 14336 kiB 2025/09/11 17:01:43 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:43 Created qlog file: /logs/qlog/d44369902124b7d18138a19df544f42a.sqlog 2025/09/11 17:01:43 client Starting new connection to server4 ([::]:46121 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d44369902124b7d18138a19df544f42a, version v1 2025/09/11 17:01:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:43 client -> Sending packet 0 (1280 bytes) for connection d44369902124b7d18138a19df544f42a, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: d44369902124b7d18138a19df544f42a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:43 client -> Sending packet 1 (1280 bytes) for connection d44369902124b7d18138a19df544f42a, Initial 2025/09/11 17:01:43 client Long Header{Type: Initial, DestConnectionID: d44369902124b7d18138a19df544f42a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:43 client -> &wire.CryptoFrame{Offset: 1232, Data length: 277, Offset + Data length: 1509} 2025/09/11 17:01:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:44 client -> Sending packet 2 (1280 bytes) for connection d44369902124b7d18138a19df544f42a, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: d44369902124b7d18138a19df544f42a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:44 client -> Sending packet 3 (1280 bytes) for connection d44369902124b7d18138a19df544f42a, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: d44369902124b7d18138a19df544f42a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1232, Data length: 277, Offset + Data length: 1509} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:44 client <- Reading packet 1396479475 (1200 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fab8fcd0ee0991445e58e223ceeb700b9714, Token: (empty), PacketNumber: 1396479475, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/09/11 17:01:44 client Received first packet. Switching destination connection ID to: fab8fcd0ee0991445e58e223ceeb700b9714 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [2] 2025/09/11 17:01:44 client updated RTT: 32.804646ms (σ: 16.402323ms) 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client -> Sending packet 4 (1280 bytes) for connection d44369902124b7d18138a19df544f42a, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: fab8fcd0ee0991445e58e223ceeb700b9714, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1396479475, LowestAcked: 1396479475, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:44 client <- Reading packet 1396479476 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fab8fcd0ee0991445e58e223ceeb700b9714, Token: (empty), PacketNumber: 1396479476, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [3] 2025/09/11 17:01:44 client updated RTT: 33.033ms (σ: 12.76ms) 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 284 bytes. 2025/09/11 17:01:44 client <- Reading packet 1396479474 (765 bytes) for connection (empty), Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fab8fcd0ee0991445e58e223ceeb700b9714, PacketNumber: 1396479474, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/11 17:01:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d44369902124b7d18138a19df544f42a, InitialSourceConnectionID: fab8fcd0ee0991445e58e223ceeb700b9714, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x9f2d62a1c024e56b06d831b3dd7be1b3, EnableResetStreamAt: false} 2025/09/11 17:01:44 client <- Reading packet 1396479474 (284 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1396479474, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d1e045bb669ef263c029d703ad7f2e3b1f11, StatelessResetToken: 0xc600ad8d959dd722ee379fd4cfc16e29} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e8a624ca117005624e8e332135c15abf7072, StatelessResetToken: 0x2a3e9757ced611a7a288a122163c081f} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, StatelessResetToken: 0xd64a7d15c999168cdb08aa1ea3694c56} 2025/09/11 17:01:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d44369902124b7d18138a19df544f42a 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1396479476, LowestAcked: 1396479475, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client Short Header{DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:44 client Dropping Initial keys. 2025/09/11 17:01:44 client -> Sending packet 1 (116 bytes) for connection d44369902124b7d18138a19df544f42a, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1396479474, LowestAcked: 1396479474, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Short Header{DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client -> Sending packet 2 (53 bytes) for connection d44369902124b7d18138a19df544f42a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1396479474, LowestAcked: 1396479474, DelayTime: 658.654µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 1396479475 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1396479475, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client <- Reading packet 1396479476 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1396479476, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 200µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Peer doesn't await address validation any longer. 2025/09/11 17:01:44 client newly acked packets (2): [0 1] 2025/09/11 17:01:44 client Canceling loss detection timer. 2025/09/11 17:01:44 client Dropping Handshake keys. 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 283979185096c584e964ebf47fe1c8b75aa0, StatelessResetToken: 0x22ccc7e889994dddac5d09d890348f29} 2025/09/11 17:01:44 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:44 client <- &wire.NewTokenFrame{Token: 0x367c8537e714ed544fe282812b2dcb249b3ada9bbb47999cd6960afb9d5eed3e64aa4fee39ee161cf1} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:44 client -> Sending packet 3 (52 bytes) for connection d44369902124b7d18138a19df544f42a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1396479476, LowestAcked: 1396479474, DelayTime: 137.046µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 1396479477 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1396479477, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:44 client -> Sending packet 4 (40 bytes) for connection d44369902124b7d18138a19df544f42a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: e34d988d5a0d722cd7cb74797fd1ee642184, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:44 client Connection d44369902124b7d18138a19df544f42a closed. 2025/09/11 17:01:44 Requesting https://server4:443/vqsctbfktc. 2025/09/11 17:01:44 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:44 Increased send buffer size to 14336 kiB 2025/09/11 17:01:44 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:44 Created qlog file: /logs/qlog/50ae85b88a0dcfa8a85ee01bc89bee.sqlog 2025/09/11 17:01:44 client Starting new connection to server4 ([::]:40666 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 50ae85b88a0dcfa8a85ee01bc89bee, version v1 2025/09/11 17:01:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:44 client -> Sending packet 0 (1280 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 50ae85b88a0dcfa8a85ee01bc89bee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:44 client -> Sending packet 1 (1280 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 50ae85b88a0dcfa8a85ee01bc89bee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/11 17:01:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:44 client -> Sending packet 2 (1280 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 50ae85b88a0dcfa8a85ee01bc89bee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/11 17:01:44 client -> Sending packet 3 (1280 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 50ae85b88a0dcfa8a85ee01bc89bee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/11 17:01:44 client <- Reading packet 2048739124 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a76a834dbefcb0cc2c8d2f442a94aabe978c, Token: (empty), PacketNumber: 2048739124, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:44 client Received first packet. Switching destination connection ID to: a76a834dbefcb0cc2c8d2f442a94aabe978c 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [2] 2025/09/11 17:01:44 client updated RTT: 32.308665ms (σ: 16.154332ms) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:44 client <- Reading packet 2048739125 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a76a834dbefcb0cc2c8d2f442a94aabe978c, Token: (empty), PacketNumber: 2048739125, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [3] 2025/09/11 17:01:44 client updated RTT: 32.605ms (σ: 12.71ms) 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 286 bytes. 2025/09/11 17:01:44 client <- Reading packet 2048739124 (765 bytes) for connection (empty), Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a76a834dbefcb0cc2c8d2f442a94aabe978c, PacketNumber: 2048739124, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/11 17:01:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 50ae85b88a0dcfa8a85ee01bc89bee, InitialSourceConnectionID: a76a834dbefcb0cc2c8d2f442a94aabe978c, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x9deb91824ef03fc4bbe2918d35b6eab1, EnableResetStreamAt: false} 2025/09/11 17:01:44 client <- Reading packet 2048739124 (286 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2048739124, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e494e1b2d595bb92ca70a622126aadce556a, StatelessResetToken: 0x7119209a9be81a72ddaefd442467c937} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27b0d3034fc10e21db9dbb4419fc4aa80d78, StatelessResetToken: 0x910e82572d747cb4a1746259182587d7} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 147af69b7d1c99b21424668c49ee615163a9, StatelessResetToken: 0x0348209cd65244611de0f9cb4cef5eff} 2025/09/11 17:01:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2048739125, LowestAcked: 2048739124, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:44 client Dropping Initial keys. 2025/09/11 17:01:44 client -> Sending packet 1 (60 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2048739124, LowestAcked: 2048739124, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client -> Sending packet 1 (53 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2048739124, LowestAcked: 2048739124, DelayTime: 695.853µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client -> Sending packet 2 (56 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:44 client <- Reading packet 2048739125 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2048739125, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:44 client -> Sending packet 3 (53 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2048739125, LowestAcked: 2048739124, DelayTime: 25.286702ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:44 client -> Sending packet 2 (84 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client -> Sending packet 3 (84 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client <- Reading packet 2048739128 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2048739128, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:44 client -> Sending packet 4 (54 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2048739128, LowestAcked: 2048739124, AckRanges: {{Largest: 2048739128, Smallest: 2048739128}, {Largest: 2048739125, Smallest: 2048739124}}, DelayTime: 72.766µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 2048739129 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2048739129, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e35715f9fa4942738e264b6276fec0650e9, StatelessResetToken: 0x7f18e36f6cdb8d35465b8f759445b43a} 2025/09/11 17:01:44 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:44 client Dropping Handshake keys. 2025/09/11 17:01:44 client <- &wire.NewTokenFrame{Token: 0x36f527f942b5a4d1cd70fb1edb43f33fdc17a2a5a43295b18c03ad01a2a6163e0300f5a41a3dc2bf4a} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:44 client -> Sending packet 6 (56 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2048739129, LowestAcked: 2048739124, AckRanges: {{Largest: 2048739129, Smallest: 2048739128}, {Largest: 2048739125, Smallest: 2048739124}}, DelayTime: 130.765µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:44 client Skipping packet number 5 2025/09/11 17:01:44 client -> Sending packet 7 (56 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:44 client -> Sending packet 8 (40 bytes) for connection 50ae85b88a0dcfa8a85ee01bc89bee, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 147af69b7d1c99b21424668c49ee615163a9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:44 client Connection 50ae85b88a0dcfa8a85ee01bc89bee closed. 2025/09/11 17:01:44 Requesting https://server4:443/smtwznglai. 2025/09/11 17:01:44 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:44 Increased send buffer size to 14336 kiB 2025/09/11 17:01:44 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:44 Created qlog file: /logs/qlog/dfaffa6124d344af46a3b22a1e1b2b20.sqlog 2025/09/11 17:01:44 client Starting new connection to server4 ([::]:57341 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dfaffa6124d344af46a3b22a1e1b2b20, version v1 2025/09/11 17:01:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:44 client -> Sending packet 0 (1280 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: dfaffa6124d344af46a3b22a1e1b2b20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:44 client -> Sending packet 1 (1280 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: dfaffa6124d344af46a3b22a1e1b2b20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1232, Data length: 281, Offset + Data length: 1513} 2025/09/11 17:01:44 client <- Reading packet 1790372604 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8555f1291883820be9536dd577a30bfc600, Token: (empty), PacketNumber: 1790372604, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:44 client Received first packet. Switching destination connection ID to: a8555f1291883820be9536dd577a30bfc600 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [0] 2025/09/11 17:01:44 client updated RTT: 32.025691ms (σ: 16.012845ms) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:44 client <- Reading packet 1790372605 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8555f1291883820be9536dd577a30bfc600, Token: (empty), PacketNumber: 1790372605, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [1] 2025/09/11 17:01:44 client updated RTT: 32.335ms (σ: 12.629ms) 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 287 bytes. 2025/09/11 17:01:44 client <- Reading packet 1790372604 (764 bytes) for connection (empty), Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8555f1291883820be9536dd577a30bfc600, PacketNumber: 1790372604, PacketNumberLen: 4, Length: 735, Version: v1} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/11 17:01:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dfaffa6124d344af46a3b22a1e1b2b20, InitialSourceConnectionID: a8555f1291883820be9536dd577a30bfc600, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x85cc8c3213b3b2b4352d6aadc3bee5cf, EnableResetStreamAt: false} 2025/09/11 17:01:44 client <- Reading packet 1790372604 (287 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1790372604, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d9a7b27fcb8d3c84d1f6cb177ecbc632ca1f, StatelessResetToken: 0x1229beaa2ab41ddff74ba0534a0c8d90} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fa22a52a713b79cc65bf922dc3fc3390286b, StatelessResetToken: 0xd6c9f975d053096dfa1f7297b0c01391} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, StatelessResetToken: 0xf235fbefa98c6af65dd616c8ffa2b392} 2025/09/11 17:01:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1790372605, LowestAcked: 1790372604, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client Short Header{DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:44 client Dropping Initial keys. 2025/09/11 17:01:44 client -> Sending packet 1 (116 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1790372604, LowestAcked: 1790372604, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Short Header{DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client -> Sending packet 2 (53 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1790372604, LowestAcked: 1790372604, DelayTime: 664.795µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 1790372605 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1790372605, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client <- Reading packet 1790372606 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1790372606, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 176µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Peer doesn't await address validation any longer. 2025/09/11 17:01:44 client newly acked packets (2): [0 1] 2025/09/11 17:01:44 client Canceling loss detection timer. 2025/09/11 17:01:44 client Dropping Handshake keys. 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 78ea30a89f1b48918e5904d5a8093299608f, StatelessResetToken: 0x6dc429b9c285f72c4ed911c3e255a136} 2025/09/11 17:01:44 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:44 client <- &wire.NewTokenFrame{Token: 0x36eb32cf3b3a1590b61b24005a82c1a1045c2e13fa31eb8e51ba8385fe70c485198509beca4675cc3a} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:44 client -> Sending packet 3 (52 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 1790372606, LowestAcked: 1790372604, DelayTime: 190.847µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 1790372607 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1790372607, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:44 client -> Sending packet 4 (40 bytes) for connection dfaffa6124d344af46a3b22a1e1b2b20, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: 48de96b7215e822c55bea8a34ea4fc3cd4fc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:44 client Connection dfaffa6124d344af46a3b22a1e1b2b20 closed. 2025/09/11 17:01:44 Requesting https://server4:443/bunnltmekr. 2025/09/11 17:01:44 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:44 Increased send buffer size to 14336 kiB 2025/09/11 17:01:44 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:44 Created qlog file: /logs/qlog/4684169ea2169d2f44feda98f4c9e12896.sqlog 2025/09/11 17:01:44 client Starting new connection to server4 ([::]:42507 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4684169ea2169d2f44feda98f4c9e12896, version v1 2025/09/11 17:01:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:44 client -> Sending packet 0 (1280 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 4684169ea2169d2f44feda98f4c9e12896, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/11 17:01:44 client -> Sending packet 1 (1280 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 4684169ea2169d2f44feda98f4c9e12896, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1231, Data length: 282, Offset + Data length: 1513} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client <- Reading packet 2046911133 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 58c2667c03269050ff1beae6df5ff731781e, Token: (empty), PacketNumber: 2046911133, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:44 client Received first packet. Switching destination connection ID to: 58c2667c03269050ff1beae6df5ff731781e 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [0] 2025/09/11 17:01:44 client updated RTT: 32.077982ms (σ: 16.038991ms) 2025/09/11 17:01:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:44 client -> Sending packet 2 (1280 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 58c2667c03269050ff1beae6df5ff731781e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1231, Data length: 282, Offset + Data length: 1513} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client -> Sending packet 3 (1280 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 58c2667c03269050ff1beae6df5ff731781e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1231, Data length: 282, Offset + Data length: 1513} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:44 client <- Reading packet 2046911134 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 58c2667c03269050ff1beae6df5ff731781e, Token: (empty), PacketNumber: 2046911134, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [3] 2025/09/11 17:01:44 client updated RTT: 32.533ms (σ: 12.942ms) 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 283 bytes. 2025/09/11 17:01:44 client <- Reading packet 2046911133 (766 bytes) for connection (empty), Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 58c2667c03269050ff1beae6df5ff731781e, PacketNumber: 2046911133, PacketNumberLen: 4, Length: 737, Version: v1} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/11 17:01:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4684169ea2169d2f44feda98f4c9e12896, InitialSourceConnectionID: 58c2667c03269050ff1beae6df5ff731781e, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x1524749370768b0ef781a392f4c721a1, EnableResetStreamAt: false} 2025/09/11 17:01:44 client <- Reading packet 2046911133 (283 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2046911133, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08033f21982634381c6a5f177ceee4e0073d, StatelessResetToken: 0x3b907d1810f144fc553bb0aa6d160b04} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bf07a469125e1f2a3c1d89569c1b7cf6e758, StatelessResetToken: 0x7348fccc790a912974abb46ef23bb4dd} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, StatelessResetToken: 0x376a19b05ffc5e711cf57aa76995917f} 2025/09/11 17:01:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2046911134, LowestAcked: 2046911133, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client Short Header{DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:44 client Dropping Initial keys. 2025/09/11 17:01:44 client -> Sending packet 1 (60 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2046911133, LowestAcked: 2046911133, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client -> Sending packet 1 (72 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2046911133, LowestAcked: 2046911133, DelayTime: 709.86µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client <- Reading packet 2046911135 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2046911135, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 216µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Peer doesn't await address validation any longer. 2025/09/11 17:01:44 client newly acked packets (2): [0 1] 2025/09/11 17:01:44 client updated RTT: 32.746ms (σ: 10.133ms) 2025/09/11 17:01:44 client ECN capability confirmed. 2025/09/11 17:01:44 client Canceling loss detection timer. 2025/09/11 17:01:44 client Dropping Handshake keys. 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c730030efc9df5df97b066cc6b227de6d4fd, StatelessResetToken: 0xcc02060d6bf5d90c7caa21f70b0dfaa1} 2025/09/11 17:01:44 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:44 client <- &wire.NewTokenFrame{Token: 0x3615e7cc09a0122562732a5d8ed1727b97b47399b28058ff8098d800648957fe961de0a2461585b94b} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:44 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:44 client Ignoring all packets below 2046911134. 2025/09/11 17:01:44 client -> Sending packet 2 (52 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 2046911135, LowestAcked: 2046911135, DelayTime: 166.702µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 2046911136 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2046911136, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:44 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:44 client -> Sending packet 3 (40 bytes) for connection 4684169ea2169d2f44feda98f4c9e12896, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: e6a2fef0c01d7e59512d9506de8af486e98f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:44 client Connection 4684169ea2169d2f44feda98f4c9e12896 closed. 2025/09/11 17:01:44 Requesting https://server4:443/rsjblyiifr. 2025/09/11 17:01:44 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:44 Increased send buffer size to 14336 kiB 2025/09/11 17:01:44 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:44 Created qlog file: /logs/qlog/973aba817445ad523b2cb04943f45518e1671769.sqlog 2025/09/11 17:01:44 client Starting new connection to server4 ([::]:59773 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 973aba817445ad523b2cb04943f45518e1671769, version v1 2025/09/11 17:01:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:44 client -> Sending packet 0 (1280 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 973aba817445ad523b2cb04943f45518e1671769, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:44 client -> Sending packet 1 (1280 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: 973aba817445ad523b2cb04943f45518e1671769, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 1228, Data length: 286, Offset + Data length: 1514} 2025/09/11 17:01:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:44 client <- Reading packet 571415529 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2b0cdb05600e894fba625635a2d5dcd33393, Token: (empty), PacketNumber: 571415529, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:44 client Received first packet. Switching destination connection ID to: 2b0cdb05600e894fba625635a2d5dcd33393 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [0] 2025/09/11 17:01:44 client updated RTT: 32.055068ms (σ: 16.027534ms) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:44 client <- Reading packet 571415530 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2b0cdb05600e894fba625635a2d5dcd33393, Token: (empty), PacketNumber: 571415530, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:44 client newly acked packets (1): [1] 2025/09/11 17:01:44 client updated RTT: 32.379ms (σ: 12.67ms) 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 281 bytes. 2025/09/11 17:01:44 client <- Reading packet 571415529 (770 bytes) for connection (empty), Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2b0cdb05600e894fba625635a2d5dcd33393, PacketNumber: 571415529, PacketNumberLen: 4, Length: 741, Version: v1} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/09/11 17:01:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 973aba817445ad523b2cb04943f45518e1671769, InitialSourceConnectionID: 2b0cdb05600e894fba625635a2d5dcd33393, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xe2a624fec0d223a3cc6373eb00cc95d5, EnableResetStreamAt: false} 2025/09/11 17:01:44 client <- Reading packet 571415529 (281 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 571415529, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2cf25f06f196aa466115c4a580573b297d21, StatelessResetToken: 0xc85ccb9bebcb50697d6e11b59f79aedf} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a4e6d8a8ee6e22b3e327e546d25b17682a6, StatelessResetToken: 0xf1812d428cb4a66f572bcb3f025f44f2} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, StatelessResetToken: 0x186efdf4141d4c2d04d374e4fbc3bc4f} 2025/09/11 17:01:44 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769 2025/09/11 17:01:44 client Long Header{Type: Initial, DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 571415530, LowestAcked: 571415529, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:44 client Dropping Initial keys. 2025/09/11 17:01:44 client -> Sending packet 1 (112 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, Handshake 2025/09/11 17:01:44 client Long Header{Type: Handshake, DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 571415529, LowestAcked: 571415529, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client -> Sending packet 2 (49 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 571415529, LowestAcked: 571415529, DelayTime: 674.864µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 571415531 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 571415531, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0dc3096fa416c7d3e7aca39a2ef9e8eded2f, StatelessResetToken: 0x5f3adff072eed7c9852ea07fab0e7c80} 2025/09/11 17:01:44 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:44 client Dropping Handshake keys. 2025/09/11 17:01:44 client <- &wire.NewTokenFrame{Token: 0x365d750982a6fb02586e273e853e6c1cba4c5dc705752f27883cb31b39c0fc1534b859ba8139efea21} 2025/09/11 17:01:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:44 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:44 client -> Sending packet 3 (50 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 571415531, LowestAcked: 571415529, AckRanges: {{Largest: 571415531, Smallest: 571415531}, {Largest: 571415529, Smallest: 571415529}}, DelayTime: 92.053µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:44 client <- Reading packet 571415532 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 571415532, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.832ms} 2025/09/11 17:01:44 client newly acked packets (1): [0] 2025/09/11 17:01:44 client updated RTT: 32.899ms (σ: 10.543ms) 2025/09/11 17:01:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:44 client -> Sending packet 5 (56 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client -> Sending packet 6 (56 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:44 client <- Reading packet 571415534 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 571415534, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:44 client -> Sending packet 7 (52 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:44 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:44 client -> &wire.AckFrame{LargestAcked: 571415534, LowestAcked: 571415529, AckRanges: {{Largest: 571415534, Smallest: 571415534}, {Largest: 571415532, Smallest: 571415531}, {Largest: 571415529, Smallest: 571415529}}, DelayTime: 86.692µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:44 client <- Reading packet 571415535 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:44 client Short Header{DestConnectionID: (empty), PacketNumber: 571415535, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:44 client <- &wire.PingFrame{} 2025/09/11 17:01:44 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:45 client -> Sending packet 8 (1366 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.PingFrame{} 2025/09/11 17:01:45 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:45 client -> Sending packet 9 (53 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 571415535, LowestAcked: 571415529, AckRanges: {{Largest: 571415535, Smallest: 571415534}, {Largest: 571415532, Smallest: 571415531}, {Largest: 571415529, Smallest: 571415529}}, DelayTime: 25.290758ms, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client <- Reading packet 571415537 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 571415537, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:45 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:45 client -> Sending packet 10 (54 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 571415537, LowestAcked: 571415529, AckRanges: {{Largest: 571415537, Smallest: 571415537}, {Largest: 571415535, Smallest: 571415534}, {Largest: 571415532, Smallest: 571415531}, {Largest: 571415529, Smallest: 571415529}}, DelayTime: 87.714µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:45 client -> Sending packet 11 (40 bytes) for connection 973aba817445ad523b2cb04943f45518e1671769, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: eafbd1311f73040f6de205b59ab81e228ba0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:45 client Connection 973aba817445ad523b2cb04943f45518e1671769 closed. 2025/09/11 17:01:45 Requesting https://server4:443/prxkjejeyj. 2025/09/11 17:01:45 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:45 Increased send buffer size to 14336 kiB 2025/09/11 17:01:45 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:45 Created qlog file: /logs/qlog/a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8.sqlog 2025/09/11 17:01:45 client Starting new connection to server4 ([::]:40968 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, version v1 2025/09/11 17:01:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:45 client -> Sending packet 0 (1280 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> Sending packet 1 (1280 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1228, Data length: 287, Offset + Data length: 1515} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:45 client -> Sending packet 2 (1280 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/11 17:01:45 client -> Sending packet 3 (1280 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1228, Data length: 287, Offset + Data length: 1515} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:45 client <- Reading packet 1468961481 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3514f16263a865a7e3b0ca3a35ebce82b5e0, Token: (empty), PacketNumber: 1468961481, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:45 client Received first packet. Switching destination connection ID to: 3514f16263a865a7e3b0ca3a35ebce82b5e0 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:45 client newly acked packets (1): [2] 2025/09/11 17:01:45 client updated RTT: 32.458934ms (σ: 16.229467ms) 2025/09/11 17:01:45 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:45 client <- Reading packet 1468961482 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3514f16263a865a7e3b0ca3a35ebce82b5e0, Token: (empty), PacketNumber: 1468961482, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:45 client newly acked packets (1): [3] 2025/09/11 17:01:45 client updated RTT: 32.741ms (σ: 12.738ms) 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/09/11 17:01:45 client <- Reading packet 1468961481 (768 bytes) for connection (empty), Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3514f16263a865a7e3b0ca3a35ebce82b5e0, PacketNumber: 1468961481, PacketNumberLen: 4, Length: 739, Version: v1} 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/11 17:01:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, InitialSourceConnectionID: 3514f16263a865a7e3b0ca3a35ebce82b5e0, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xaecd3ad8fb4b653f39d83043626c5d71, EnableResetStreamAt: false} 2025/09/11 17:01:45 client <- Reading packet 1468961481 (283 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1468961481, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7971adc56381849fd43ef027a5180b45f347, StatelessResetToken: 0x3fb221aac44f6fb33f7ed730c47feb46} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f419878495e9796e34f79e76f08930e3f7a, StatelessResetToken: 0x29ad38eae3530d1cca8f0c5e1fac940b} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, StatelessResetToken: 0x981d9ecc7a60f1d59f7dfea5372147d9} 2025/09/11 17:01:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1468961482, LowestAcked: 1468961481, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:45 client Short Header{DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:45 client Dropping Initial keys. 2025/09/11 17:01:45 client -> Sending packet 1 (60 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1468961481, LowestAcked: 1468961481, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client -> Sending packet 1 (53 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1468961481, LowestAcked: 1468961481, DelayTime: 820.868µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:45 client -> Sending packet 2 (84 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:45 client -> Sending packet 3 (84 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:45 client <- Reading packet 1468961482 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1468961482, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.PingFrame{} 2025/09/11 17:01:45 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:45 client <- Reading packet 1468961483 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1468961483, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:45 client Dropping Handshake keys. 2025/09/11 17:01:45 client <- &wire.NewTokenFrame{Token: 0x36d9a170f342be6338f5a19fc200427a6edd34ad395569643930417fc5dd764870335d6989548d1bde} 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:45 client -> Sending packet 3 (73 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1468961483, LowestAcked: 1468961481, DelayTime: 82.865µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:45 client -> Sending packet 4 (58 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:45 client <- Reading packet 1468961484 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1468961484, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.PingFrame{} 2025/09/11 17:01:45 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:45 client <- Reading packet 1468961485 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1468961485, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 152µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client newly acked packets (1): [4] 2025/09/11 17:01:45 client updated RTT: 32.794ms (σ: 9.66ms) 2025/09/11 17:01:45 client ECN capability confirmed. 2025/09/11 17:01:45 client Canceling loss detection timer. 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 25e58a58d5f2c4070a744d7067cc0333fd91, StatelessResetToken: 0x652a40aad67177b217568587d2620e53} 2025/09/11 17:01:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:45 client -> Sending packet 5 (52 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1468961485, LowestAcked: 1468961481, DelayTime: 98.275µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:45 client Skipping packet number 6 2025/09/11 17:01:45 client -> Sending packet 7 (40 bytes) for connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: f8f0b89022744c663946fdaa98e4b0508c84, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:45 client Connection a13b64e2f4271bd8ef6923d0f2c296dff45dd0b8 closed. 2025/09/11 17:01:45 Requesting https://server4:443/inusjlvtxr. 2025/09/11 17:01:45 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:45 Increased send buffer size to 14336 kiB 2025/09/11 17:01:45 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:45 Created qlog file: /logs/qlog/8012950b5a624e3c10.sqlog 2025/09/11 17:01:45 client Starting new connection to server4 ([::]:39305 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8012950b5a624e3c10, version v1 2025/09/11 17:01:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:45 client -> Sending packet 0 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 8012950b5a624e3c10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/11 17:01:45 client -> Sending packet 1 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 8012950b5a624e3c10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1239, Data length: 273, Offset + Data length: 1512} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:45 client -> Sending packet 2 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 8012950b5a624e3c10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/11 17:01:45 client -> Sending packet 3 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 8012950b5a624e3c10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1239, Data length: 273, Offset + Data length: 1512} 2025/09/11 17:01:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:45 client <- Received Retry: 2025/09/11 17:01:45 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 20dcfcc87af64c6d33332aa960031dd09217, Token: 0xb7ac5c7ef22b05c6ca85e9b70b73fc8e6706b3de5a1d58545fd22859555b71ec5b86263a324fe1941a93c2530f0560b4284f00668d98b9abd108d3856c24eaf9679c1f3cb8d82c6e2d01b7a7d0bb5e62ca9fdfa03776125fd2fd, Version: v1} 2025/09/11 17:01:45 client Switching destination connection ID to: 20dcfcc87af64c6d33332aa960031dd09217 2025/09/11 17:01:45 client -> Sending packet 4 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 20dcfcc87af64c6d33332aa960031dd09217, SrcConnectionID: (empty), Token: 0xb7ac5c7ef22b05c6ca85e9b70b73fc8e6706b3de5a1d58545fd22859555b71ec5b86263a324fe1941a93c2530f0560b4284f00668d98b9abd108d3856c24eaf9679c1f3cb8d82c6e2d01b7a7d0bb5e62ca9fdfa03776125fd2fd, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/09/11 17:01:45 client -> Sending packet 5 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 20dcfcc87af64c6d33332aa960031dd09217, SrcConnectionID: (empty), Token: 0xb7ac5c7ef22b05c6ca85e9b70b73fc8e6706b3de5a1d58545fd22859555b71ec5b86263a324fe1941a93c2530f0560b4284f00668d98b9abd108d3856c24eaf9679c1f3cb8d82c6e2d01b7a7d0bb5e62ca9fdfa03776125fd2fd, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1139, Data length: 100, Offset + Data length: 1239} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1239, Data length: 273, Offset + Data length: 1512} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client <- Reading packet 1368331596 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 82b40b37e1a853c63e120a1a3097efe52f56, Token: (empty), PacketNumber: 1368331596, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:45 client Received first packet. Switching destination connection ID to: 82b40b37e1a853c63e120a1a3097efe52f56 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/09/11 17:01:45 client newly acked packets (1): [5] 2025/09/11 17:01:45 client updated RTT: 33.166039ms (σ: 16.583019ms) 2025/09/11 17:01:45 client setting loss timer for packet 4 (Initial) to 37.311793ms (in 2025-09-11 17:01:45.745217561 +0000 UTC m=+3.649601642) 2025/09/11 17:01:45 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-11 17:01:45.745217561 +0000 UTC m=+3.649601642 2025/09/11 17:01:45 client lost packet 4 (time threshold) 2025/09/11 17:01:45 client -> Sending packet 6 (1280 bytes) for connection 8012950b5a624e3c10, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 82b40b37e1a853c63e120a1a3097efe52f56, SrcConnectionID: (empty), Token: 0xb7ac5c7ef22b05c6ca85e9b70b73fc8e6706b3de5a1d58545fd22859555b71ec5b86263a324fe1941a93c2530f0560b4284f00668d98b9abd108d3856c24eaf9679c1f3cb8d82c6e2d01b7a7d0bb5e62ca9fdfa03776125fd2fd, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:45 client <- Reading packet 1368331597 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 82b40b37e1a853c63e120a1a3097efe52f56, Token: (empty), PacketNumber: 1368331597, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s} 2025/09/11 17:01:45 client newly acked packets (1): [6] 2025/09/11 17:01:45 client updated RTT: 33.236ms (σ: 12.577ms) 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 273 bytes. 2025/09/11 17:01:45 client <- Reading packet 1368331596 (778 bytes) for connection (empty), Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 82b40b37e1a853c63e120a1a3097efe52f56, PacketNumber: 1368331596, PacketNumberLen: 4, Length: 749, Version: v1} 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/09/11 17:01:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8012950b5a624e3c10, InitialSourceConnectionID: 82b40b37e1a853c63e120a1a3097efe52f56, RetrySourceConnectionID: 20dcfcc87af64c6d33332aa960031dd09217, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x848bfa605b62adc3c716b7833a9504d9, EnableResetStreamAt: false} 2025/09/11 17:01:45 client <- Reading packet 1368331596 (273 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1368331596, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0ee2767feeba3277e57d56180b0aff3d2bbe, StatelessResetToken: 0xae3cb6466e1943f8dfec4330cd528b4b} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1c8d17bbe24c66cb7c2ee21a214a50f7fa9b, StatelessResetToken: 0x3cd7983ecf6f65fea8e51a9585149cf0} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, StatelessResetToken: 0x7b84964698bf2caeedc5b9ebdc55be85} 2025/09/11 17:01:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8012950b5a624e3c10 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, SrcConnectionID: (empty), Token: 0xb7ac5c7ef22b05c6ca85e9b70b73fc8e6706b3de5a1d58545fd22859555b71ec5b86263a324fe1941a93c2530f0560b4284f00668d98b9abd108d3856c24eaf9679c1f3cb8d82c6e2d01b7a7d0bb5e62ca9fdfa03776125fd2fd, PacketNumber: 7, PacketNumberLen: 2, Length: 1038, Version: v1} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1368331597, LowestAcked: 1368331596, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:45 client Dropping Initial keys. 2025/09/11 17:01:45 client -> Sending packet 1 (116 bytes) for connection 8012950b5a624e3c10, Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1368331596, LowestAcked: 1368331596, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:45 client -> Sending packet 2 (53 bytes) for connection 8012950b5a624e3c10, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1368331596, LowestAcked: 1368331596, DelayTime: 712.855µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client <- Reading packet 1368331597 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1368331597, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.PingFrame{} 2025/09/11 17:01:45 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:45 client <- Reading packet 1368331598 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1368331598, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 408µs} 2025/09/11 17:01:45 client Peer doesn't await address validation any longer. 2025/09/11 17:01:45 client newly acked packets (2): [0 1] 2025/09/11 17:01:45 client updated RTT: 33.342ms (σ: 9.646ms) 2025/09/11 17:01:45 client Canceling loss detection timer. 2025/09/11 17:01:45 client Dropping Handshake keys. 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d5a4019841046ba237f411e715b89317abef, StatelessResetToken: 0xd37c2009182a2ecede8fc406906710d3} 2025/09/11 17:01:45 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:45 client <- &wire.NewTokenFrame{Token: 0x3633955593bb6971a2b01739d6c09142a3bb0ff2c6bca49bd9e793042439976adb44ba0747ca07a061} 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:45 client -> Sending packet 3 (52 bytes) for connection 8012950b5a624e3c10, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 1368331598, LowestAcked: 1368331596, DelayTime: 141.204µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client <- Reading packet 1368331599 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1368331599, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:45 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:45 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:45 client -> Sending packet 4 (40 bytes) for connection 8012950b5a624e3c10, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2758569f332fee42cdb286e2e01fb56af2cf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:45 client Connection 8012950b5a624e3c10 closed. 2025/09/11 17:01:45 Requesting https://server4:443/prkzboprvk. 2025/09/11 17:01:45 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:45 Increased send buffer size to 14336 kiB 2025/09/11 17:01:45 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:45 Created qlog file: /logs/qlog/75e3961d36ab4c028c10101694.sqlog 2025/09/11 17:01:45 client Starting new connection to server4 ([::]:40597 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 75e3961d36ab4c028c10101694, version v1 2025/09/11 17:01:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:45 client -> Sending packet 0 (1280 bytes) for connection 75e3961d36ab4c028c10101694, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 75e3961d36ab4c028c10101694, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> Sending packet 1 (1280 bytes) for connection 75e3961d36ab4c028c10101694, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 75e3961d36ab4c028c10101694, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1235, Data length: 284, Offset + Data length: 1519} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client updated RTT: 33.150019ms (σ: 16.575009ms) 2025/09/11 17:01:45 client <- Received Retry: 2025/09/11 17:01:45 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 1f698daf5fc33e463004aa8e271c021c8f2b, Token: 0xb77baac318666fd6d6bdd05f532511dac333c9fce3daf61405f4ca4cec5214076653a2fc422143ad38868cb564f508d8e3dd503e13fb0b4fe599e7825895c0eb38fa61bcef254002f76e75b7dc707a55001a9eb8fa0ff2eca174, Version: v1} 2025/09/11 17:01:45 client Switching destination connection ID to: 1f698daf5fc33e463004aa8e271c021c8f2b 2025/09/11 17:01:45 client -> Sending packet 2 (1280 bytes) for connection 75e3961d36ab4c028c10101694, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 1f698daf5fc33e463004aa8e271c021c8f2b, SrcConnectionID: (empty), Token: 0xb77baac318666fd6d6bdd05f532511dac333c9fce3daf61405f4ca4cec5214076653a2fc422143ad38868cb564f508d8e3dd503e13fb0b4fe599e7825895c0eb38fa61bcef254002f76e75b7dc707a55001a9eb8fa0ff2eca174, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:01:45 client -> Sending packet 3 (1280 bytes) for connection 75e3961d36ab4c028c10101694, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 1f698daf5fc33e463004aa8e271c021c8f2b, SrcConnectionID: (empty), Token: 0xb77baac318666fd6d6bdd05f532511dac333c9fce3daf61405f4ca4cec5214076653a2fc422143ad38868cb564f508d8e3dd503e13fb0b4fe599e7825895c0eb38fa61bcef254002f76e75b7dc707a55001a9eb8fa0ff2eca174, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1235, Data length: 284, Offset + Data length: 1519} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1205, Data length: 30, Offset + Data length: 1235} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:45 client <- Reading packet 237998562 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56981d25c9de3ba0b8449c12e9b5581f3f63, Token: (empty), PacketNumber: 237998562, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:45 client Received first packet. Switching destination connection ID to: 56981d25c9de3ba0b8449c12e9b5581f3f63 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:45 client newly acked packets (2): [2 3] 2025/09/11 17:01:45 client updated RTT: 33.325ms (σ: 12.781ms) 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Parsed a coalesced packet. Part 2: 781 bytes. Remaining: 270 bytes. 2025/09/11 17:01:45 client <- Reading packet 237998561 (781 bytes) for connection (empty), Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56981d25c9de3ba0b8449c12e9b5581f3f63, PacketNumber: 237998561, PacketNumberLen: 4, Length: 752, Version: v1} 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/11 17:01:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 75e3961d36ab4c028c10101694, InitialSourceConnectionID: 56981d25c9de3ba0b8449c12e9b5581f3f63, RetrySourceConnectionID: 1f698daf5fc33e463004aa8e271c021c8f2b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x7916f3757f74f077a8d540be9456eb39, EnableResetStreamAt: false} 2025/09/11 17:01:45 client <- Reading packet 237998561 (270 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 237998561, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1c7dd995d82f6c2a05f298b2b7e814f97167, StatelessResetToken: 0xd12a9d11c396e5f53fd14458f3336f2d} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d99d1b9b213fcd3c275eebca8e5c1a7f5eee, StatelessResetToken: 0xa89cca4d12d30f1ac43fc83ddf90c8ec} 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, StatelessResetToken: 0x20e7a081d758bf1a9272a930e902db9c} 2025/09/11 17:01:45 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 75e3961d36ab4c028c10101694 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, SrcConnectionID: (empty), Token: 0xb77baac318666fd6d6bdd05f532511dac333c9fce3daf61405f4ca4cec5214076653a2fc422143ad38868cb564f508d8e3dd503e13fb0b4fe599e7825895c0eb38fa61bcef254002f76e75b7dc707a55001a9eb8fa0ff2eca174, PacketNumber: 4, PacketNumberLen: 2, Length: 1038, Version: v1} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 237998562, LowestAcked: 237998562, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:45 client Dropping Initial keys. 2025/09/11 17:01:45 client -> Sending packet 1 (56 bytes) for connection 75e3961d36ab4c028c10101694, Handshake 2025/09/11 17:01:45 client Long Header{Type: Handshake, DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 237998561, LowestAcked: 237998561, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client -> Sending packet 1 (68 bytes) for connection 75e3961d36ab4c028c10101694, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 237998561, LowestAcked: 237998561, DelayTime: 752.96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:45 client <- Reading packet 237998563 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 237998563, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 264µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client Peer doesn't await address validation any longer. 2025/09/11 17:01:45 client newly acked packets (2): [0 1] 2025/09/11 17:01:45 client updated RTT: 33.448ms (σ: 9.833ms) 2025/09/11 17:01:45 client ECN capability confirmed. 2025/09/11 17:01:45 client Canceling loss detection timer. 2025/09/11 17:01:45 client Dropping Handshake keys. 2025/09/11 17:01:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8533025b9ef309834e918ea80abba386d208, StatelessResetToken: 0x8b26b2220aff52bade1cee5819dec826} 2025/09/11 17:01:45 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:45 client <- &wire.NewTokenFrame{Token: 0x36d98ebaa6548e5ff511a954c051eb384b99948ddb78ee8fb668e4072692908dc1c6721b86c43cac22} 2025/09/11 17:01:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:45 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:45 client Ignoring all packets below 237998562. 2025/09/11 17:01:45 client -> Sending packet 2 (48 bytes) for connection 75e3961d36ab4c028c10101694, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.AckFrame{LargestAcked: 237998563, LowestAcked: 237998563, DelayTime: 176.871µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:45 client <- Reading packet 237998564 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:45 client Short Header{DestConnectionID: (empty), PacketNumber: 237998564, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:45 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:45 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:45 client -> Sending packet 3 (40 bytes) for connection 75e3961d36ab4c028c10101694, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:45 client Short Header{DestConnectionID: 2e8ccc91b896a23b28797407a9bc9552f81a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:45 client Connection 75e3961d36ab4c028c10101694 closed. 2025/09/11 17:01:45 Requesting https://server4:443/bszydcxfxs. 2025/09/11 17:01:45 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:45 Increased send buffer size to 14336 kiB 2025/09/11 17:01:45 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:45 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:45 Created qlog file: /logs/qlog/7a78041dcb3929a3fc85.sqlog 2025/09/11 17:01:45 client Starting new connection to server4 ([::]:43723 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7a78041dcb3929a3fc85, version v1 2025/09/11 17:01:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:45 client -> Sending packet 0 (1280 bytes) for connection 7a78041dcb3929a3fc85, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 7a78041dcb3929a3fc85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/11 17:01:45 client -> Sending packet 1 (1280 bytes) for connection 7a78041dcb3929a3fc85, Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: 7a78041dcb3929a3fc85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 1238, Data length: 267, Offset + Data length: 1505} 2025/09/11 17:01:45 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:45 client <- Reading packet 1972314716 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, Token: (empty), PacketNumber: 1972314716, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:45 client Received first packet. Switching destination connection ID to: ba0993c8223d9390abc05c4d0a5c7ab3c9fd 2025/09/11 17:01:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:45 client newly acked packets (1): [0] 2025/09/11 17:01:45 client updated RTT: 32.096359ms (σ: 16.048179ms) 2025/09/11 17:01:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:46 client -> Sending packet 2 (1280 bytes) for connection 7a78041dcb3929a3fc85, Initial 2025/09/11 17:01:46 client Long Header{Type: Initial, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 1238, Data length: 267, Offset + Data length: 1505} 2025/09/11 17:01:46 client -> Sending packet 3 (1280 bytes) for connection 7a78041dcb3929a3fc85, Initial 2025/09/11 17:01:46 client Long Header{Type: Initial, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 1238, Data length: 267, Offset + Data length: 1505} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:46 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:46 client <- Reading packet 1972314718 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, Token: (empty), PacketNumber: 1972314718, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:46 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 292 bytes. 2025/09/11 17:01:46 client <- Reading packet 1972314717 (759 bytes) for connection (empty), Handshake 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, PacketNumber: 1972314717, PacketNumberLen: 4, Length: 730, Version: v1} 2025/09/11 17:01:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/11 17:01:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7a78041dcb3929a3fc85, InitialSourceConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xb291a6929206b7c90871ae006f44eec2, EnableResetStreamAt: false} 2025/09/11 17:01:46 client <- Reading packet 1972314717 (292 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314717, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7a78041dcb3929a3fc85 2025/09/11 17:01:46 client Long Header{Type: Initial, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314718, LowestAcked: 1972314716, AckRanges: {{Largest: 1972314718, Smallest: 1972314718}, {Largest: 1972314716, Smallest: 1972314716}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:46 client Dropping Initial keys. 2025/09/11 17:01:46 client -> Sending packet 1 (116 bytes) for connection 7a78041dcb3929a3fc85, Handshake 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314717, LowestAcked: 1972314717, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client Short Header{DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:46 client -> Sending packet 2 (84 bytes) for connection 7a78041dcb3929a3fc85, Handshake 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:46 client -> Sending packet 3 (84 bytes) for connection 7a78041dcb3929a3fc85, Handshake 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:46 client <- Reading packet 1972314718 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314718, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:46 client <- &wire.PingFrame{} 2025/09/11 17:01:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:46 client -> Sending packet 1 (52 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314718, LowestAcked: 1972314717, DelayTime: 82.344µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/11 17:01:46 client -> Sending packet 4 (84 bytes) for connection 7a78041dcb3929a3fc85, Handshake 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:46 client -> Sending packet 5 (84 bytes) for connection 7a78041dcb3929a3fc85, Handshake 2025/09/11 17:01:46 client Long Header{Type: Handshake, DestConnectionID: ba0993c8223d9390abc05c4d0a5c7ab3c9fd, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:46 client <- Reading packet 1972314721 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314721, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bd4fbfd1b6c3a8447b2ecf92fe73867d27e1, StatelessResetToken: 0xaf2096ed08eda92175a9151da6e4390f} 2025/09/11 17:01:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7e83a94db52e6364aa548e98b6a9789a3f5, StatelessResetToken: 0xfc0e8db5758601a74ec830b11338ed14} 2025/09/11 17:01:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, StatelessResetToken: 0x0826a6db783a410d0fca0494f05a80a5} 2025/09/11 17:01:46 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:46 client -> Sending packet 2 (56 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314721, LowestAcked: 1972314717, AckRanges: {{Largest: 1972314721, Smallest: 1972314721}, {Largest: 1972314718, Smallest: 1972314717}}, DelayTime: 120.947µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:46 client <- Reading packet 1972314722 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314722, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:46 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:46 client Dropping Handshake keys. 2025/09/11 17:01:46 client <- &wire.NewTokenFrame{Token: 0x367f278540871f2685284bfed7031528d46c0795cc158ec420abf5361f5e095f512d7c9ec75715ab31} 2025/09/11 17:01:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:46 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:46 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:46 client -> Sending packet 3 (55 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314722, LowestAcked: 1972314717, AckRanges: {{Largest: 1972314722, Smallest: 1972314721}, {Largest: 1972314718, Smallest: 1972314717}}, DelayTime: 25.29237ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:46 client -> Sending packet 5 (56 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:46 client Skipping packet number 4 2025/09/11 17:01:46 client -> Sending packet 6 (39 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:46 client <- Reading packet 1972314724 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314724, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 27d96ecf6acdb17571526e55b6715f702f0b, StatelessResetToken: 0x8bccb55d03394c7806e8618cb0fb5a27} 2025/09/11 17:01:46 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:46 client -> Sending packet 7 (56 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314724, LowestAcked: 1972314717, AckRanges: {{Largest: 1972314724, Smallest: 1972314724}, {Largest: 1972314722, Smallest: 1972314721}, {Largest: 1972314718, Smallest: 1972314717}}, DelayTime: 100.118µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client <- Reading packet 1972314725 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314725, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:46 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 7.376ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:46 client newly acked packets (1): [6] 2025/09/11 17:01:46 client updated RTT: 32.856ms (σ: 13.555ms) 2025/09/11 17:01:46 client ECN capability confirmed. 2025/09/11 17:01:46 client setting loss timer for packet 5 (1-RTT) to 42.948272ms (in 2025-09-11 17:01:46.673261978 +0000 UTC m=+4.577646069) 2025/09/11 17:01:46 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-11 17:01:46.673261978 +0000 UTC m=+4.577646069 2025/09/11 17:01:46 client lost packet 5 (time threshold) 2025/09/11 17:01:46 client Canceling loss detection timer. 2025/09/11 17:01:46 client -> Sending packet 8 (56 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:46 client -> Sending packet 10 (56 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:46 client -> Sending packet 11 (56 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:46 client -> Sending packet 12 (1366 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.PingFrame{} 2025/09/11 17:01:46 client <- Reading packet 1972314728 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314728, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:46 client <- &wire.PingFrame{} 2025/09/11 17:01:46 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:46 client -> Sending packet 13 (58 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:46 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:46 client -> &wire.AckFrame{LargestAcked: 1972314728, LowestAcked: 1972314717, AckRanges: {{Largest: 1972314728, Smallest: 1972314728}, {Largest: 1972314725, Smallest: 1972314724}, {Largest: 1972314722, Smallest: 1972314721}, {Largest: 1972314718, Smallest: 1972314717}}, DelayTime: 97.843µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client <- Reading packet 1972314729 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1972314729, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:47 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:47 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:47 client -> Sending packet 14 (40 bytes) for connection 7a78041dcb3929a3fc85, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 06053ced6cf7d6fb5ab2922725ae4adf3317, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:47 client Connection 7a78041dcb3929a3fc85 closed. 2025/09/11 17:01:47 Requesting https://server4:443/djjbtoyqos. 2025/09/11 17:01:47 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:47 Increased send buffer size to 14336 kiB 2025/09/11 17:01:47 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:47 Created qlog file: /logs/qlog/68d48a7aa26e3ae36aa5e109.sqlog 2025/09/11 17:01:47 client Starting new connection to server4 ([::]:35753 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 68d48a7aa26e3ae36aa5e109, version v1 2025/09/11 17:01:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:47 client -> Sending packet 0 (1280 bytes) for connection 68d48a7aa26e3ae36aa5e109, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: 68d48a7aa26e3ae36aa5e109, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/11 17:01:47 client -> Sending packet 1 (1280 bytes) for connection 68d48a7aa26e3ae36aa5e109, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: 68d48a7aa26e3ae36aa5e109, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 1236, Data length: 275, Offset + Data length: 1511} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:47 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:47 client <- Reading packet 1703582671 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa270f4535f61b9653463ab5bd63d5450dba, Token: (empty), PacketNumber: 1703582671, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:47 client Received first packet. Switching destination connection ID to: aa270f4535f61b9653463ab5bd63d5450dba 2025/09/11 17:01:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:47 client newly acked packets (2): [0 1] 2025/09/11 17:01:47 client updated RTT: 34.591499ms (σ: 17.295749ms) 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 290 bytes. 2025/09/11 17:01:47 client <- Reading packet 1703582670 (761 bytes) for connection (empty), Handshake 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aa270f4535f61b9653463ab5bd63d5450dba, PacketNumber: 1703582670, PacketNumberLen: 4, Length: 732, Version: v1} 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/11 17:01:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 68d48a7aa26e3ae36aa5e109, InitialSourceConnectionID: aa270f4535f61b9653463ab5bd63d5450dba, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x08894eb29d99d21e6e7ddbb403dd1e62, EnableResetStreamAt: false} 2025/09/11 17:01:47 client <- Reading packet 1703582670 (290 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1703582670, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d8a6892e162d06ef77d1c75a8fab59ef59e3, StatelessResetToken: 0x16ceaf8370169f302212b5b3cb222298} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 11f4e5f846d12ef438071aea8b310605d931, StatelessResetToken: 0xd7b44c12ac63fb37aa29294ad603d41d} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, StatelessResetToken: 0x67d4a487171386f344f372190da33cae} 2025/09/11 17:01:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68d48a7aa26e3ae36aa5e109 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1703582671, LowestAcked: 1703582671, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:47 client Dropping Initial keys. 2025/09/11 17:01:47 client -> Sending packet 1 (116 bytes) for connection 68d48a7aa26e3ae36aa5e109, Handshake 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1703582670, LowestAcked: 1703582670, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:47 client -> Sending packet 2 (53 bytes) for connection 68d48a7aa26e3ae36aa5e109, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1703582670, LowestAcked: 1703582670, DelayTime: 831.508µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client <- Reading packet 1703582671 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1703582671, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.PingFrame{} 2025/09/11 17:01:47 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:47 client <- Reading packet 1703582672 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1703582672, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9df3ec46cee86d5b713fa2a5b1e89d0e58f9, StatelessResetToken: 0x0fb69bde4b081346c868ad25d6f89728} 2025/09/11 17:01:47 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:47 client Dropping Handshake keys. 2025/09/11 17:01:47 client <- &wire.NewTokenFrame{Token: 0x361987e693e52455a51bce7bf84c1719ea330425efe5a4b7f2191b685759a86fb96249ed4802f5e46a} 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:47 client -> Sending packet 3 (52 bytes) for connection 68d48a7aa26e3ae36aa5e109, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1703582672, LowestAcked: 1703582670, DelayTime: 89.758µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client <- Reading packet 1703582673 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1703582673, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 4.648ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client newly acked packets (1): [0] 2025/09/11 17:01:47 client setting loss timer for packet 1 (1-RTT) to 38.915436ms (in 2025-09-11 17:01:47.076360082 +0000 UTC m=+4.980744164) 2025/09/11 17:01:47 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-11 17:01:47.076360082 +0000 UTC m=+4.980744164 2025/09/11 17:01:47 client lost packet 1 (time threshold) 2025/09/11 17:01:47 client Canceling loss detection timer. 2025/09/11 17:01:47 client -> Sending packet 4 (56 bytes) for connection 68d48a7aa26e3ae36aa5e109, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:47 client <- Reading packet 1703582674 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1703582674, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.PingFrame{} 2025/09/11 17:01:47 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:47 client <- Reading packet 1703582675 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1703582675, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 168µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client newly acked packets (1): [4] 2025/09/11 17:01:47 client updated RTT: 34.258ms (σ: 13.635ms) 2025/09/11 17:01:47 client ECN capability confirmed. 2025/09/11 17:01:47 client Canceling loss detection timer. 2025/09/11 17:01:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:47 client -> Sending packet 5 (52 bytes) for connection 68d48a7aa26e3ae36aa5e109, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1703582675, LowestAcked: 1703582670, DelayTime: 124.032µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:47 client -> Sending packet 6 (40 bytes) for connection 68d48a7aa26e3ae36aa5e109, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: eaffc53a3b5040412a0decf31d9e3ec164c7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:47 client Connection 68d48a7aa26e3ae36aa5e109 closed. 2025/09/11 17:01:47 Requesting https://server4:443/ncwzgmpjdp. 2025/09/11 17:01:47 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:47 Increased send buffer size to 14336 kiB 2025/09/11 17:01:47 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:47 Created qlog file: /logs/qlog/f89ada6794881054f7bee361fb8158a76d4d3a.sqlog 2025/09/11 17:01:47 client Starting new connection to server4 ([::]:51340 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f89ada6794881054f7bee361fb8158a76d4d3a, version v1 2025/09/11 17:01:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:47 client -> Sending packet 0 (1280 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: f89ada6794881054f7bee361fb8158a76d4d3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:47 client -> Sending packet 1 (1280 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: f89ada6794881054f7bee361fb8158a76d4d3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:47 client -> Sending packet 2 (1280 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: f89ada6794881054f7bee361fb8158a76d4d3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:47 client -> Sending packet 3 (1280 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: f89ada6794881054f7bee361fb8158a76d4d3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:47 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/09/11 17:01:47 client <- Reading packet 493309646 (144 bytes) for connection (empty), Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e235f66ac64d7c48932fe40630554de0f015, Token: (empty), PacketNumber: 493309646, PacketNumberLen: 4, Length: 114, Version: v1} 2025/09/11 17:01:47 client Received first packet. Switching destination connection ID to: e235f66ac64d7c48932fe40630554de0f015 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 287 bytes. 2025/09/11 17:01:47 client <- Reading packet 493309645 (769 bytes) for connection (empty), Handshake 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e235f66ac64d7c48932fe40630554de0f015, PacketNumber: 493309645, PacketNumberLen: 4, Length: 740, Version: v1} 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/11 17:01:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f89ada6794881054f7bee361fb8158a76d4d3a, InitialSourceConnectionID: e235f66ac64d7c48932fe40630554de0f015, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x910306858ce967a49ce8f9c0c4164975, EnableResetStreamAt: false} 2025/09/11 17:01:47 client <- Reading packet 493309645 (287 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309645, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: e235f66ac64d7c48932fe40630554de0f015, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 493309646, LowestAcked: 493309646, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: e235f66ac64d7c48932fe40630554de0f015, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:47 client Dropping Initial keys. 2025/09/11 17:01:47 client -> Sending packet 1 (112 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, Handshake 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: e235f66ac64d7c48932fe40630554de0f015, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 493309645, LowestAcked: 493309645, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Short Header{DestConnectionID: e235f66ac64d7c48932fe40630554de0f015, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:47 client <- Reading packet 493309646 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309646, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.PingFrame{} 2025/09/11 17:01:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:47 client -> Sending packet 1 (48 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: e235f66ac64d7c48932fe40630554de0f015, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 493309646, LowestAcked: 493309645, DelayTime: 76.032µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client <- Reading packet 493309647 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309647, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:47 client Dropping Handshake keys. 2025/09/11 17:01:47 client <- &wire.NewTokenFrame{Token: 0x36bedfe921e4a26835d1ff155c9674b1c406faa82976db66e7bd77a47bb0316716713282559dfde701} 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:47 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:47 client -> Sending packet 2 (1366 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: e235f66ac64d7c48932fe40630554de0f015, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.PingFrame{} 2025/09/11 17:01:47 client <- Reading packet 493309648 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309648, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 642a898c0ba4631f3c94ed6cfe2111dde852, StatelessResetToken: 0x7fed199ecdca1e5e1ad37d41c6ae917c} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 18e9124873f8bf0a55ae015cdd51f2470bec, StatelessResetToken: 0x90c9816d1d727b400f1800f51c3b088d} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, StatelessResetToken: 0xc6682b5f58d3b7102eed8c7d54898409} 2025/09/11 17:01:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:47 client -> Sending packet 3 (50 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 493309648, LowestAcked: 493309645, DelayTime: 65.803µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:47 client <- Reading packet 493309651 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309651, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.PingFrame{} 2025/09/11 17:01:47 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:47 client -> Sending packet 4 (50 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 493309651, LowestAcked: 493309645, AckRanges: {{Largest: 493309651, Smallest: 493309651}, {Largest: 493309648, Smallest: 493309645}}, DelayTime: 112.981µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client <- Reading packet 493309652 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309652, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:47 client <- &wire.NewTokenFrame{Token: 0x36bedfe921e4a26835d1ff155c9674b1c406faa82976db66e7bd77a47bb0316716713282559dfde701} 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:47 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:47 client <- Reading packet 493309653 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309653, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 642a898c0ba4631f3c94ed6cfe2111dde852, StatelessResetToken: 0x7fed199ecdca1e5e1ad37d41c6ae917c} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 18e9124873f8bf0a55ae015cdd51f2470bec, StatelessResetToken: 0x90c9816d1d727b400f1800f51c3b088d} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, StatelessResetToken: 0xc6682b5f58d3b7102eed8c7d54898409} 2025/09/11 17:01:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:47 client -> Sending packet 5 (50 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 493309653, LowestAcked: 493309645, AckRanges: {{Largest: 493309653, Smallest: 493309651}, {Largest: 493309648, Smallest: 493309645}}, DelayTime: 81.052µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:47 client -> Sending packet 7 (56 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:47 client Skipping packet number 6 2025/09/11 17:01:47 client -> Sending packet 8 (39 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:47 client <- Reading packet 493309654 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 493309654, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 40µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client newly acked packets (3): [2 7 8] 2025/09/11 17:01:47 client updated RTT: 32.230854ms (σ: 16.115427ms) 2025/09/11 17:01:47 client ECN capability confirmed. 2025/09/11 17:01:47 client Canceling loss detection timer. 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2ecaadf6f53b10088767838c240ce6ae1668, StatelessResetToken: 0x2945d4562c8c79fe53fe4bbf5461d74e} 2025/09/11 17:01:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:47 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:47 client -> Sending packet 9 (1409 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.PingFrame{} 2025/09/11 17:01:47 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:47 client -> Sending packet 10 (40 bytes) for connection f89ada6794881054f7bee361fb8158a76d4d3a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: 403ace4bc82218c6da85d2b62d1046ed41ff, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:47 client Connection f89ada6794881054f7bee361fb8158a76d4d3a closed. 2025/09/11 17:01:47 Requesting https://server4:443/qdvdvoouix. 2025/09/11 17:01:47 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:47 Increased send buffer size to 14336 kiB 2025/09/11 17:01:47 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:47 Created qlog file: /logs/qlog/400d31816bc1989fedb05ba8630ea552672e0b.sqlog 2025/09/11 17:01:47 client Starting new connection to server4 ([::]:59573 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 400d31816bc1989fedb05ba8630ea552672e0b, version v1 2025/09/11 17:01:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:47 client -> Sending packet 0 (1280 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: 400d31816bc1989fedb05ba8630ea552672e0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:47 client -> Sending packet 1 (1280 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: 400d31816bc1989fedb05ba8630ea552672e0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:47 client <- Reading packet 1617591013 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 66eede1a41a6ab05397934f66746813edf90, Token: (empty), PacketNumber: 1617591013, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:47 client Received first packet. Switching destination connection ID to: 66eede1a41a6ab05397934f66746813edf90 2025/09/11 17:01:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:47 client newly acked packets (1): [0] 2025/09/11 17:01:47 client updated RTT: 32.297733ms (σ: 16.148866ms) 2025/09/11 17:01:47 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:47 client <- Reading packet 1617591014 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 66eede1a41a6ab05397934f66746813edf90, Token: (empty), PacketNumber: 1617591014, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:47 client newly acked packets (1): [1] 2025/09/11 17:01:47 client updated RTT: 32.598ms (σ: 12.714ms) 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 282 bytes. 2025/09/11 17:01:47 client <- Reading packet 1617591013 (769 bytes) for connection (empty), Handshake 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 66eede1a41a6ab05397934f66746813edf90, PacketNumber: 1617591013, PacketNumberLen: 4, Length: 740, Version: v1} 2025/09/11 17:01:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/11 17:01:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 400d31816bc1989fedb05ba8630ea552672e0b, InitialSourceConnectionID: 66eede1a41a6ab05397934f66746813edf90, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x108cbfdc604a7e6aa77518a0539eb690, EnableResetStreamAt: false} 2025/09/11 17:01:47 client <- Reading packet 1617591013 (282 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1617591013, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5edd8d14842859a5e0d58e04b150ce1cf55, StatelessResetToken: 0x9b4133244420cd33ac39ae2028bd9665} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8ceb17e421d529087c6029f6ba2a6b9489f9, StatelessResetToken: 0x07129915ace47d37f2125f725bf3508a} 2025/09/11 17:01:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cea4be384599fa4188dda43639751970e959, StatelessResetToken: 0x5dc1a87e4bdd2d978a3b697dedb12f4e} 2025/09/11 17:01:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b 2025/09/11 17:01:47 client Long Header{Type: Initial, DestConnectionID: cea4be384599fa4188dda43639751970e959, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1617591014, LowestAcked: 1617591013, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: cea4be384599fa4188dda43639751970e959, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:47 client Short Header{DestConnectionID: cea4be384599fa4188dda43639751970e959, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:47 client Dropping Initial keys. 2025/09/11 17:01:47 client -> Sending packet 1 (116 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, Handshake 2025/09/11 17:01:47 client Long Header{Type: Handshake, DestConnectionID: cea4be384599fa4188dda43639751970e959, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1617591013, LowestAcked: 1617591013, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:47 client Short Header{DestConnectionID: cea4be384599fa4188dda43639751970e959, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:47 client -> Sending packet 2 (53 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:47 client Short Header{DestConnectionID: cea4be384599fa4188dda43639751970e959, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:47 client -> &wire.AckFrame{LargestAcked: 1617591013, LowestAcked: 1617591013, DelayTime: 716.582µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:48 client -> Sending packet 2 (84 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, Handshake 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: cea4be384599fa4188dda43639751970e959, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:48 client -> Sending packet 3 (84 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, Handshake 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: cea4be384599fa4188dda43639751970e959, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:48 client <- Reading packet 1617591014 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1617591014, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.PingFrame{} 2025/09/11 17:01:48 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:48 client <- Reading packet 1617591015 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1617591015, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 83.832ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client Peer doesn't await address validation any longer. 2025/09/11 17:01:48 client newly acked packets (1): [1] 2025/09/11 17:01:48 client lost packet 0 (time threshold) 2025/09/11 17:01:48 client Canceling loss detection timer. 2025/09/11 17:01:48 client Dropping Handshake keys. 2025/09/11 17:01:48 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:48 client <- &wire.NewTokenFrame{Token: 0x36d66e296605e590ee5584a5f4e3def738d9ae1ace4d75d6a644dece2b8c36b19cc396a070b11938dc} 2025/09/11 17:01:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 884, Offset + Data length: 884} 2025/09/11 17:01:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:48 client -> Sending packet 3 (54 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: cea4be384599fa4188dda43639751970e959, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1617591015, LowestAcked: 1617591013, DelayTime: 139.622µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:48 client <- Reading packet 1617591018 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1617591018, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 67d5c6704983e062ae08381826627ea2effc, StatelessResetToken: 0xbd54e47974bb45865af35ca078151449} 2025/09/11 17:01:48 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:48 client -> Sending packet 4 (54 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: cea4be384599fa4188dda43639751970e959, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1617591018, LowestAcked: 1617591013, AckRanges: {{Largest: 1617591018, Smallest: 1617591018}, {Largest: 1617591015, Smallest: 1617591013}}, DelayTime: 91.392µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client <- Reading packet 1617591019 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1617591019, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 4.464ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client newly acked packets (1): [3] 2025/09/11 17:01:48 client updated RTT: 32.919ms (σ: 10.178ms) 2025/09/11 17:01:48 client ECN capability confirmed. 2025/09/11 17:01:48 client Canceling loss detection timer. 2025/09/11 17:01:48 client Ignoring all packets below 1617591016. 2025/09/11 17:01:48 client <- Reading packet 1617591020 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1617591020, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 884, Data length: 140, Offset + Data length: 1024} 2025/09/11 17:01:48 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:48 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:48 client -> Sending packet 5 (40 bytes) for connection 400d31816bc1989fedb05ba8630ea552672e0b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: cea4be384599fa4188dda43639751970e959, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:48 client Connection 400d31816bc1989fedb05ba8630ea552672e0b closed. 2025/09/11 17:01:48 Requesting https://server4:443/aqaygeessc. 2025/09/11 17:01:48 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:48 Increased send buffer size to 14336 kiB 2025/09/11 17:01:48 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:48 Created qlog file: /logs/qlog/0441c8da4cd607841d6bb4828055b6f971b49d.sqlog 2025/09/11 17:01:48 client Starting new connection to server4 ([::]:58853 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0441c8da4cd607841d6bb4828055b6f971b49d, version v1 2025/09/11 17:01:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:48 client -> Sending packet 0 (1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 0441c8da4cd607841d6bb4828055b6f971b49d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:48 client -> Sending packet 1 (1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 0441c8da4cd607841d6bb4828055b6f971b49d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:48 client <- Reading packet 1481963107 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 743b94a94487e8217bbca440294e399c82e6, Token: (empty), PacketNumber: 1481963107, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:48 client Received first packet. Switching destination connection ID to: 743b94a94487e8217bbca440294e399c82e6 2025/09/11 17:01:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:48 client newly acked packets (1): [0] 2025/09/11 17:01:48 client updated RTT: 32.055853ms (σ: 16.027926ms) 2025/09/11 17:01:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:48 client -> Sending packet 2 (1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:48 client -> Sending packet 3 (1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:48 client -> Sending packet 4 (1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:48 client -> Sending packet 5 (1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 287, Offset + Data length: 1516} 2025/09/11 17:01:48 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/09/11 17:01:48 client <- Reading packet 1481963109 (144 bytes) for connection (empty), Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 743b94a94487e8217bbca440294e399c82e6, Token: (empty), PacketNumber: 1481963109, PacketNumberLen: 4, Length: 114, Version: v1} 2025/09/11 17:01:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:48 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 288 bytes. 2025/09/11 17:01:48 client <- Reading packet 1481963108 (768 bytes) for connection (empty), Handshake 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 743b94a94487e8217bbca440294e399c82e6, PacketNumber: 1481963108, PacketNumberLen: 4, Length: 739, Version: v1} 2025/09/11 17:01:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/11 17:01:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0441c8da4cd607841d6bb4828055b6f971b49d, InitialSourceConnectionID: 743b94a94487e8217bbca440294e399c82e6, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x95964e66c49fe14f847f249bbff9e719, EnableResetStreamAt: false} 2025/09/11 17:01:48 client <- Reading packet 1481963108 (288 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1481963108, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1481963109, LowestAcked: 1481963107, AckRanges: {{Largest: 1481963109, Smallest: 1481963109}, {Largest: 1481963107, Smallest: 1481963107}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:48 client Dropping Initial keys. 2025/09/11 17:01:48 client -> Sending packet 1 (116 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Handshake 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1481963108, LowestAcked: 1481963108, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client Short Header{DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:48 client -> Sending packet 2 (84 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Handshake 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:48 client -> Sending packet 3 (84 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, Handshake 2025/09/11 17:01:48 client Long Header{Type: Handshake, DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:48 client <- Reading packet 1481963109 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1481963109, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.PingFrame{} 2025/09/11 17:01:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:48 client -> Sending packet 1 (52 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1481963109, LowestAcked: 1481963108, DelayTime: 75.311µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client <- Reading packet 1481963112 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1481963112, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.PingFrame{} 2025/09/11 17:01:48 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:48 client -> Sending packet 2 (54 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: 743b94a94487e8217bbca440294e399c82e6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1481963112, LowestAcked: 1481963108, AckRanges: {{Largest: 1481963112, Smallest: 1481963112}, {Largest: 1481963109, Smallest: 1481963108}}, DelayTime: 60.23µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client <- Reading packet 1481963113 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1481963113, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e323f099502a4b38f101c5543198c01721f4, StatelessResetToken: 0x651beb12b005d6a586989872f29648a9} 2025/09/11 17:01:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7f6293cc1c8634ee5943656ca19761483d22, StatelessResetToken: 0x1f9cf45b110df574f4fc62cabd54d6b5} 2025/09/11 17:01:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b68243b951f6709fb5b2b6b72edabbb5a736, StatelessResetToken: 0xe49d61a710238508bae6d5b81dd6c6d8} 2025/09/11 17:01:48 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:48 client -> Sending packet 3 (56 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: b68243b951f6709fb5b2b6b72edabbb5a736, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.AckFrame{LargestAcked: 1481963113, LowestAcked: 1481963108, AckRanges: {{Largest: 1481963113, Smallest: 1481963112}, {Largest: 1481963109, Smallest: 1481963108}}, DelayTime: 86.642µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:48 client <- Reading packet 1481963114 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1481963114, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:48 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:48 client Dropping Handshake keys. 2025/09/11 17:01:48 client <- &wire.NewTokenFrame{Token: 0x364a44bd79a20077769ae3a7e89431ee689afb6f0030a7151be22f81cee9655f5fc98d04657dc34282} 2025/09/11 17:01:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:48 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:48 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:48 client -> Sending packet 4 (40 bytes) for connection 0441c8da4cd607841d6bb4828055b6f971b49d, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:48 client Short Header{DestConnectionID: b68243b951f6709fb5b2b6b72edabbb5a736, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:48 client Connection 0441c8da4cd607841d6bb4828055b6f971b49d closed. 2025/09/11 17:01:48 Requesting https://server4:443/gonojzwnhq. 2025/09/11 17:01:48 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:48 Increased send buffer size to 14336 kiB 2025/09/11 17:01:48 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:48 Created qlog file: /logs/qlog/9e9d476da2a8e1451c0b441c4fbe20f07f.sqlog 2025/09/11 17:01:48 client Starting new connection to server4 ([::]:60191 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9e9d476da2a8e1451c0b441c4fbe20f07f, version v1 2025/09/11 17:01:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:48 client -> Sending packet 0 (1280 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 9e9d476da2a8e1451c0b441c4fbe20f07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:48 client -> Sending packet 1 (1280 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: 9e9d476da2a8e1451c0b441c4fbe20f07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/11 17:01:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:48 client <- Reading packet 1313857771 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 789d87fc9415e414a6d636b9e70d6a96e5fe, Token: (empty), PacketNumber: 1313857771, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:48 client Received first packet. Switching destination connection ID to: 789d87fc9415e414a6d636b9e70d6a96e5fe 2025/09/11 17:01:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:48 client newly acked packets (1): [0] 2025/09/11 17:01:48 client updated RTT: 32.066872ms (σ: 16.033436ms) 2025/09/11 17:01:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:49 client -> Sending packet 2 (1280 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 789d87fc9415e414a6d636b9e70d6a96e5fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:49 client -> Sending packet 3 (1280 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 789d87fc9415e414a6d636b9e70d6a96e5fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:49 client <- Reading packet 1313857772 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 789d87fc9415e414a6d636b9e70d6a96e5fe, Token: (empty), PacketNumber: 1313857772, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 284 bytes. 2025/09/11 17:01:49 client <- Reading packet 1313857771 (765 bytes) for connection (empty), Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 789d87fc9415e414a6d636b9e70d6a96e5fe, PacketNumber: 1313857771, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/11 17:01:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9e9d476da2a8e1451c0b441c4fbe20f07f, InitialSourceConnectionID: 789d87fc9415e414a6d636b9e70d6a96e5fe, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x46f43f0fe0f8a87d6bbcb52a35b54e5a, EnableResetStreamAt: false} 2025/09/11 17:01:49 client <- Reading packet 1313857771 (284 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1313857771, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a30aacf3f0d44f0b682b4d506d1b0abd89fb, StatelessResetToken: 0x0045c7afe4c961402042ba9aeb58d8fe} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0628fe2d4be0dc16b245097a20001b1d47ea, StatelessResetToken: 0xc8eabba57a17b44cb88011bd43e3e984} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15572af2c715ef96a181516c018393dde4b9, StatelessResetToken: 0xa7baf99713967e8d770f6d2fb7f64fb1} 2025/09/11 17:01:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1313857772, LowestAcked: 1313857771, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client Short Header{DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 client Dropping Initial keys. 2025/09/11 17:01:49 client -> Sending packet 1 (60 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1313857771, LowestAcked: 1313857771, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client -> Sending packet 1 (53 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1313857771, LowestAcked: 1313857771, DelayTime: 887.442µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client <- Reading packet 1313857772 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1313857772, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.PingFrame{} 2025/09/11 17:01:49 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:49 client <- Reading packet 1313857774 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1313857774, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:49 client -> Sending packet 2 (54 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1313857774, LowestAcked: 1313857771, AckRanges: {{Largest: 1313857774, Smallest: 1313857774}, {Largest: 1313857772, Smallest: 1313857771}}, DelayTime: 68.478µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client <- Reading packet 1313857775 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1313857775, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.464ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Peer doesn't await address validation any longer. 2025/09/11 17:01:49 client newly acked packets (1): [0] 2025/09/11 17:01:49 client Canceling loss detection timer. 2025/09/11 17:01:49 client Dropping Handshake keys. 2025/09/11 17:01:49 client <- Reading packet 1313857776 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1313857776, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.PingFrame{} 2025/09/11 17:01:49 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:49 client <- Reading packet 1313857777 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1313857777, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 923a1aa57ee1978679e1409581689ee6ff97, StatelessResetToken: 0x5b4ce8925560a59c1197dbae18de71ce} 2025/09/11 17:01:49 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:49 client <- &wire.NewTokenFrame{Token: 0x3653cfc1749b99ce2c9286bfe6b226c845852e66ab9470532aa8117ad0fdba075c3a33b13bb94f046c} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:49 client -> Sending packet 3 (54 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1313857777, LowestAcked: 1313857771, AckRanges: {{Largest: 1313857777, Smallest: 1313857774}, {Largest: 1313857772, Smallest: 1313857771}}, DelayTime: 111.73µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:49 client -> Sending packet 4 (40 bytes) for connection 9e9d476da2a8e1451c0b441c4fbe20f07f, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 15572af2c715ef96a181516c018393dde4b9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:49 client Connection 9e9d476da2a8e1451c0b441c4fbe20f07f closed. 2025/09/11 17:01:49 Requesting https://server4:443/kcgnlgzjgp. 2025/09/11 17:01:49 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:49 Increased send buffer size to 14336 kiB 2025/09/11 17:01:49 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:49 Created qlog file: /logs/qlog/b3b45de89ba0c919.sqlog 2025/09/11 17:01:49 client Starting new connection to server4 ([::]:34454 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b3b45de89ba0c919, version v1 2025/09/11 17:01:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:49 client -> Sending packet 0 (1280 bytes) for connection b3b45de89ba0c919, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: b3b45de89ba0c919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:01:49 client -> Sending packet 1 (1280 bytes) for connection b3b45de89ba0c919, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: b3b45de89ba0c919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/11 17:01:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:49 client -> Sending packet 2 (1280 bytes) for connection b3b45de89ba0c919, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: b3b45de89ba0c919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:49 client -> Sending packet 3 (1280 bytes) for connection b3b45de89ba0c919, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: b3b45de89ba0c919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:49 client <- Reading packet 1157946838 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 981e51f7b14cfdf5bf09184e2e97cffa0c15, Token: (empty), PacketNumber: 1157946838, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:49 client Received first packet. Switching destination connection ID to: 981e51f7b14cfdf5bf09184e2e97cffa0c15 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:49 client newly acked packets (1): [2] 2025/09/11 17:01:49 client updated RTT: 32.325922ms (σ: 16.162961ms) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:49 client <- Reading packet 1157946839 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 981e51f7b14cfdf5bf09184e2e97cffa0c15, Token: (empty), PacketNumber: 1157946839, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:49 client newly acked packets (1): [3] 2025/09/11 17:01:49 client updated RTT: 32.618ms (σ: 12.707ms) 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 294 bytes. 2025/09/11 17:01:49 client <- Reading packet 1157946838 (757 bytes) for connection (empty), Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 981e51f7b14cfdf5bf09184e2e97cffa0c15, PacketNumber: 1157946838, PacketNumberLen: 4, Length: 728, Version: v1} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/11 17:01:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b3b45de89ba0c919, InitialSourceConnectionID: 981e51f7b14cfdf5bf09184e2e97cffa0c15, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x072034c8d7a7ae22a050ac31f27d1d97, EnableResetStreamAt: false} 2025/09/11 17:01:49 client <- Reading packet 1157946838 (294 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1157946838, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 92b7c2154d5edefd64a17cfc0c6a25acadf4, StatelessResetToken: 0x9f5da11cc3bf19f40604a04e5a6ecd45} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69ab5056706583983ff4d0d589e14dd8f544, StatelessResetToken: 0x6060065873f659f2e88574530c3971e1} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, StatelessResetToken: 0xabb00516c6d218bb81475b0c626e356d} 2025/09/11 17:01:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b3b45de89ba0c919 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1157946839, LowestAcked: 1157946838, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client Short Header{DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client Dropping Initial keys. 2025/09/11 17:01:49 client -> Sending packet 1 (60 bytes) for connection b3b45de89ba0c919, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1157946838, LowestAcked: 1157946838, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client -> Sending packet 1 (53 bytes) for connection b3b45de89ba0c919, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1157946838, LowestAcked: 1157946838, DelayTime: 771.586µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client -> Sending packet 2 (56 bytes) for connection b3b45de89ba0c919, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 client <- Reading packet 1157946839 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1157946839, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.PingFrame{} 2025/09/11 17:01:49 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:49 client <- Reading packet 1157946840 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1157946840, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 200µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Peer doesn't await address validation any longer. 2025/09/11 17:01:49 client newly acked packets (2): [0 2] 2025/09/11 17:01:49 client updated RTT: 32.851ms (σ: 9.997ms) 2025/09/11 17:01:49 client ECN capability confirmed. 2025/09/11 17:01:49 client Canceling loss detection timer. 2025/09/11 17:01:49 client Dropping Handshake keys. 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8a786c423bea860c8995b12ff31e150f0b7f, StatelessResetToken: 0x7761a4f7cdc4df58f086af5ba23b77b5} 2025/09/11 17:01:49 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:49 client <- &wire.NewTokenFrame{Token: 0x36233f46137fe9f01a5083fe611048273d408a8ed40b759a3cb499db1c93913fd5187da3ff083968be} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:49 client -> Sending packet 3 (52 bytes) for connection b3b45de89ba0c919, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1157946840, LowestAcked: 1157946838, DelayTime: 172.256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client <- Reading packet 1157946841 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1157946841, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:49 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:49 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:49 client -> Sending packet 4 (40 bytes) for connection b3b45de89ba0c919, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: cbb1b36777a4fd1e62fb54e9793a0630db7e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:49 client Connection b3b45de89ba0c919 closed. 2025/09/11 17:01:49 Requesting https://server4:443/ajcajfwdtd. 2025/09/11 17:01:49 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:49 Increased send buffer size to 14336 kiB 2025/09/11 17:01:49 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:49 Created qlog file: /logs/qlog/0e875e8ccb16df4b177db9936a7aa865.sqlog 2025/09/11 17:01:49 client Starting new connection to server4 ([::]:48051 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0e875e8ccb16df4b177db9936a7aa865, version v1 2025/09/11 17:01:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:49 client -> Sending packet 0 (1280 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 0e875e8ccb16df4b177db9936a7aa865, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:49 client -> Sending packet 1 (1280 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 0e875e8ccb16df4b177db9936a7aa865, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:49 client <- Reading packet 1011427163 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aef617a7c3ea22d2fc23b21a471739f51aaa, Token: (empty), PacketNumber: 1011427163, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:49 client Received first packet. Switching destination connection ID to: aef617a7c3ea22d2fc23b21a471739f51aaa 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:49 client newly acked packets (1): [0] 2025/09/11 17:01:49 client updated RTT: 32.109791ms (σ: 16.054895ms) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:49 client <- Reading packet 1011427164 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aef617a7c3ea22d2fc23b21a471739f51aaa, Token: (empty), PacketNumber: 1011427164, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:49 client newly acked packets (1): [1] 2025/09/11 17:01:49 client updated RTT: 32.406ms (σ: 12.636ms) 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 285 bytes. 2025/09/11 17:01:49 client <- Reading packet 1011427163 (766 bytes) for connection (empty), Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aef617a7c3ea22d2fc23b21a471739f51aaa, PacketNumber: 1011427163, PacketNumberLen: 4, Length: 737, Version: v1} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/11 17:01:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0e875e8ccb16df4b177db9936a7aa865, InitialSourceConnectionID: aef617a7c3ea22d2fc23b21a471739f51aaa, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x577e6f5357dd9237dbbd67f421f63cf2, EnableResetStreamAt: false} 2025/09/11 17:01:49 client <- Reading packet 1011427163 (285 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1011427163, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bd2923d7b15a76543dd08d00cb20661c29c7, StatelessResetToken: 0x296fada0f5c281812bc1dea1df100fa9} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a506e27456e07963d9fa5947666061158ea, StatelessResetToken: 0x5a499cecd9a5345f6d352b34910bb4db} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, StatelessResetToken: 0x29c31d4c29bbd8277fed27cc17ba3452} 2025/09/11 17:01:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1011427164, LowestAcked: 1011427163, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client Dropping Initial keys. 2025/09/11 17:01:49 client -> Sending packet 1 (112 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1011427163, LowestAcked: 1011427163, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 client -> Sending packet 2 (49 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1011427163, LowestAcked: 1011427163, DelayTime: 703.859µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:49 client -> Sending packet 2 (84 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client -> Sending packet 3 (84 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client <- Reading packet 1011427164 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1011427164, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.PingFrame{} 2025/09/11 17:01:49 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:49 client <- Reading packet 1011427165 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1011427165, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:49 client Dropping Handshake keys. 2025/09/11 17:01:49 client <- &wire.NewTokenFrame{Token: 0x368d7365213173ef0c1e356ecf82df68c10bc537a95335069b0879e200f4a2ec7518ca0b6ecc86bd08} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:49 client -> Sending packet 4 (50 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1011427165, LowestAcked: 1011427163, DelayTime: 108.293µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client Skipping packet number 3 2025/09/11 17:01:49 client -> Sending packet 5 (56 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/11 17:01:49 client -> Sending packet 7 (39 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client Skipping packet number 6 2025/09/11 17:01:49 client -> Sending packet 8 (56 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 client -> Sending packet 9 (1366 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.PingFrame{} 2025/09/11 17:01:49 client <- Reading packet 1011427169 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1011427169, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 88µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client newly acked packets (1): [8] 2025/09/11 17:01:49 client updated RTT: 32.233ms (σ: 9.822ms) 2025/09/11 17:01:49 client ECN capability confirmed. 2025/09/11 17:01:49 client setting loss timer for packet 7 (1-RTT) to 36.262125ms (in 2025-09-11 17:01:49.835097996 +0000 UTC m=+7.739482067) 2025/09/11 17:01:49 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-11 17:01:49.835097996 +0000 UTC m=+7.739482067 2025/09/11 17:01:49 client lost packet 7 (time threshold) 2025/09/11 17:01:49 client Canceling loss detection timer. 2025/09/11 17:01:49 client -> Sending packet 10 (39 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client <- Reading packet 1011427171 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1011427171, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 4.248ms, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client newly acked packets (1): [9] 2025/09/11 17:01:49 client updated RTT: 32.458ms (σ: 7.817ms) 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 233652c9fdf76f88d4dca54263bfdb351474, StatelessResetToken: 0x43e2906c4618c1120ad091650985d5a9} 2025/09/11 17:01:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:49 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:49 client -> Sending packet 11 (52 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 1011427171, LowestAcked: 1011427163, AckRanges: {{Largest: 1011427171, Smallest: 1011427171}, {Largest: 1011427169, Smallest: 1011427169}, {Largest: 1011427165, Smallest: 1011427163}}, DelayTime: 117.621µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:49 client -> Sending packet 12 (40 bytes) for connection 0e875e8ccb16df4b177db9936a7aa865, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: 1c9b59d037976902ec23d0bbddf3ca90b389, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:49 client Connection 0e875e8ccb16df4b177db9936a7aa865 closed. 2025/09/11 17:01:49 Requesting https://server4:443/hcajgqxzxy. 2025/09/11 17:01:49 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:49 Increased send buffer size to 14336 kiB 2025/09/11 17:01:49 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:49 Created qlog file: /logs/qlog/660afec0d0559722b294e9b432.sqlog 2025/09/11 17:01:49 client Starting new connection to server4 ([::]:42417 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 660afec0d0559722b294e9b432, version v1 2025/09/11 17:01:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:49 client -> Sending packet 0 (1280 bytes) for connection 660afec0d0559722b294e9b432, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 660afec0d0559722b294e9b432, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/11 17:01:49 client -> Sending packet 1 (1280 bytes) for connection 660afec0d0559722b294e9b432, Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: 660afec0d0559722b294e9b432, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 1235, Data length: 279, Offset + Data length: 1514} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:49 client <- Reading packet 848694170 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08eda8045e846c4897d5d6b5ea844e83a549, Token: (empty), PacketNumber: 848694170, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:49 client Received first packet. Switching destination connection ID to: 08eda8045e846c4897d5d6b5ea844e83a549 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:49 client newly acked packets (1): [0] 2025/09/11 17:01:49 client updated RTT: 32.170147ms (σ: 16.085073ms) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:49 client <- Reading packet 848694171 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08eda8045e846c4897d5d6b5ea844e83a549, Token: (empty), PacketNumber: 848694171, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:49 client newly acked packets (1): [1] 2025/09/11 17:01:49 client updated RTT: 32.469ms (σ: 12.661ms) 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Parsed a coalesced packet. Part 2: 762 bytes. Remaining: 289 bytes. 2025/09/11 17:01:49 client <- Reading packet 848694170 (762 bytes) for connection (empty), Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08eda8045e846c4897d5d6b5ea844e83a549, PacketNumber: 848694170, PacketNumberLen: 4, Length: 733, Version: v1} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/11 17:01:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 660afec0d0559722b294e9b432, InitialSourceConnectionID: 08eda8045e846c4897d5d6b5ea844e83a549, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x0a93b3daf2594a8d52d8fab3a4887f26, EnableResetStreamAt: false} 2025/09/11 17:01:49 client <- Reading packet 848694170 (289 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 848694170, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7e24c0e9cd952d63fd47df752a5e64af608, StatelessResetToken: 0x943432d51a0c7e146bb01250db49622b} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 90a67fa17dd8b131cc91ba0b44c98c545284, StatelessResetToken: 0xdfdb62ee642dd030fdf17bfe6f1de374} 2025/09/11 17:01:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, StatelessResetToken: 0x5f7adbe6b51391d424c9be094357bfb8} 2025/09/11 17:01:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 660afec0d0559722b294e9b432 2025/09/11 17:01:49 client Long Header{Type: Initial, DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 848694171, LowestAcked: 848694170, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client Short Header{DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 client Dropping Initial keys. 2025/09/11 17:01:49 client -> Sending packet 1 (56 bytes) for connection 660afec0d0559722b294e9b432, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 848694170, LowestAcked: 848694170, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client -> Sending packet 1 (49 bytes) for connection 660afec0d0559722b294e9b432, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 848694170, LowestAcked: 848694170, DelayTime: 676.306µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:49 client -> Sending packet 2 (84 bytes) for connection 660afec0d0559722b294e9b432, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client -> Sending packet 3 (84 bytes) for connection 660afec0d0559722b294e9b432, Handshake 2025/09/11 17:01:49 client Long Header{Type: Handshake, DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:49 client <- Reading packet 848694171 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 848694171, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.PingFrame{} 2025/09/11 17:01:49 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:49 client <- Reading packet 848694172 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:49 client Short Header{DestConnectionID: (empty), PacketNumber: 848694172, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:49 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:49 client Dropping Handshake keys. 2025/09/11 17:01:49 client <- &wire.NewTokenFrame{Token: 0x369d8091e33dfa456ebb99bec7c66d8f65f09a7c9616951bf3f9478dc4f55557b1f617013a63b5dccc} 2025/09/11 17:01:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:49 client -> Sending packet 3 (69 bytes) for connection 660afec0d0559722b294e9b432, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.AckFrame{LargestAcked: 848694172, LowestAcked: 848694170, DelayTime: 108.473µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:49 client -> Sending packet 4 (58 bytes) for connection 660afec0d0559722b294e9b432, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:49 client Short Header{DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client <- Reading packet 848694174 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 848694174, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 160µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client newly acked packets (1): [4] 2025/09/11 17:01:50 client updated RTT: 32.558ms (σ: 9.675ms) 2025/09/11 17:01:50 client ECN capability confirmed. 2025/09/11 17:01:50 client Canceling loss detection timer. 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 80ff249368baf64e8112e4aef95d5f45a182, StatelessResetToken: 0x8f7bf7c96cb5c0b9c593acf6a69acb31} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:50 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:50 client -> Sending packet 5 (50 bytes) for connection 660afec0d0559722b294e9b432, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 848694174, LowestAcked: 848694170, AckRanges: {{Largest: 848694174, Smallest: 848694174}, {Largest: 848694172, Smallest: 848694170}}, DelayTime: 137.838µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:50 client -> Sending packet 6 (40 bytes) for connection 660afec0d0559722b294e9b432, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: af388e75e16fba5a474256adb6fa6f437cc5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:50 client Connection 660afec0d0559722b294e9b432 closed. 2025/09/11 17:01:50 Requesting https://server4:443/vvdumigoro. 2025/09/11 17:01:50 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:50 Increased send buffer size to 14336 kiB 2025/09/11 17:01:50 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:50 Created qlog file: /logs/qlog/5abba432d9850f1762c24e9c2e1ff7b1bcc5.sqlog 2025/09/11 17:01:50 client Starting new connection to server4 ([::]:49636 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5abba432d9850f1762c24e9c2e1ff7b1bcc5, version v1 2025/09/11 17:01:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:50 client -> Sending packet 0 (1280 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 5abba432d9850f1762c24e9c2e1ff7b1bcc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/11 17:01:50 client -> Sending packet 1 (1280 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 5abba432d9850f1762c24e9c2e1ff7b1bcc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1230, Data length: 287, Offset + Data length: 1517} 2025/09/11 17:01:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:50 client <- Reading packet 1865998574 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ded92aa77c34d95d4c921f1ee8ae435e83fa, Token: (empty), PacketNumber: 1865998574, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:50 client Received first packet. Switching destination connection ID to: ded92aa77c34d95d4c921f1ee8ae435e83fa 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (1): [0] 2025/09/11 17:01:50 client updated RTT: 32.0919ms (σ: 16.04595ms) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:50 client <- Reading packet 1865998575 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ded92aa77c34d95d4c921f1ee8ae435e83fa, Token: (empty), PacketNumber: 1865998575, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (1): [1] 2025/09/11 17:01:50 client updated RTT: 32.397ms (σ: 12.645ms) 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 284 bytes. 2025/09/11 17:01:50 client <- Reading packet 1865998574 (767 bytes) for connection (empty), Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ded92aa77c34d95d4c921f1ee8ae435e83fa, PacketNumber: 1865998574, PacketNumberLen: 4, Length: 738, Version: v1} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/11 17:01:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5abba432d9850f1762c24e9c2e1ff7b1bcc5, InitialSourceConnectionID: ded92aa77c34d95d4c921f1ee8ae435e83fa, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x186c33b5b6cabe4cea157a9ff12fa8eb, EnableResetStreamAt: false} 2025/09/11 17:01:50 client <- Reading packet 1865998574 (284 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1865998574, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c1868a5a4d1a5dfdca59654827bc6b49c83f, StatelessResetToken: 0x5f6ac0130b25bc7d1084a35462b8cca8} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 02d2647ba3baa2e7a10b61c1b551af6f4fe0, StatelessResetToken: 0x3954054c473787f52d4a48799af1df0f} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, StatelessResetToken: 0x32efb418633d2bdead7462d9094443be} 2025/09/11 17:01:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1865998575, LowestAcked: 1865998574, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client Short Header{DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client Dropping Initial keys. 2025/09/11 17:01:50 client -> Sending packet 1 (60 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1865998574, LowestAcked: 1865998574, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client -> Sending packet 1 (53 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1865998574, LowestAcked: 1865998574, DelayTime: 836.827µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client <- Reading packet 1865998575 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1865998575, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.PingFrame{} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client <- Reading packet 1865998576 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1865998576, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a607ddf1ed8d96276ac49d614f4107f7318d, StatelessResetToken: 0x99b72e52b01a22f6ba7151796efaf2f7} 2025/09/11 17:01:50 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:50 client Dropping Handshake keys. 2025/09/11 17:01:50 client <- &wire.NewTokenFrame{Token: 0x36549580c3e43dc0167e0ed09239e2f64ada8109a60b0f2296fecf84716e083a2947d3df11773e9890} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:50 client -> Sending packet 2 (52 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1865998576, LowestAcked: 1865998574, DelayTime: 102.412µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client <- Reading packet 1865998577 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1865998577, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:50 client -> Sending packet 3 (40 bytes) for connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 218f81f42ae973df17aa839f22e7c9f2976f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:50 client Connection 5abba432d9850f1762c24e9c2e1ff7b1bcc5 closed. 2025/09/11 17:01:50 Requesting https://server4:443/wvshrajkjk. 2025/09/11 17:01:50 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:50 Increased send buffer size to 14336 kiB 2025/09/11 17:01:50 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:50 Created qlog file: /logs/qlog/85c0ee8d1aef9cd4068fa4.sqlog 2025/09/11 17:01:50 client Starting new connection to server4 ([::]:37038 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 85c0ee8d1aef9cd4068fa4, version v1 2025/09/11 17:01:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:50 client -> Sending packet 0 (1280 bytes) for connection 85c0ee8d1aef9cd4068fa4, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 85c0ee8d1aef9cd4068fa4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> Sending packet 1 (1280 bytes) for connection 85c0ee8d1aef9cd4068fa4, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 85c0ee8d1aef9cd4068fa4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1237, Data length: 275, Offset + Data length: 1512} 2025/09/11 17:01:50 client <- Reading packet 1560945923 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a2f318f0a4b0f3c4e7001242fa5b178c4274, Token: (empty), PacketNumber: 1560945923, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:50 client Received first packet. Switching destination connection ID to: a2f318f0a4b0f3c4e7001242fa5b178c4274 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (1): [0] 2025/09/11 17:01:50 client updated RTT: 32.146702ms (σ: 16.073351ms) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:50 client <- Reading packet 1560945924 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a2f318f0a4b0f3c4e7001242fa5b178c4274, Token: (empty), PacketNumber: 1560945924, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (1): [1] 2025/09/11 17:01:50 client updated RTT: 32.445ms (σ: 12.654ms) 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 290 bytes. 2025/09/11 17:01:50 client <- Reading packet 1560945923 (761 bytes) for connection (empty), Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a2f318f0a4b0f3c4e7001242fa5b178c4274, PacketNumber: 1560945923, PacketNumberLen: 4, Length: 732, Version: v1} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/11 17:01:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 85c0ee8d1aef9cd4068fa4, InitialSourceConnectionID: a2f318f0a4b0f3c4e7001242fa5b178c4274, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x64d27b882278f35404f88e16a7573059, EnableResetStreamAt: false} 2025/09/11 17:01:50 client <- Reading packet 1560945923 (290 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1560945923, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d6b56c0cc5d638ef0cef2e83d50b854e32f, StatelessResetToken: 0x7d340d4e0c0dff1da58c6afba7da5400} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 322f0f6668305188f3056206f80b0c25d6d3, StatelessResetToken: 0xaba0ad505160cbd198a7362319601c2c} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, StatelessResetToken: 0x1cb9f6a2a48bdc44a33edc514bc72918} 2025/09/11 17:01:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 85c0ee8d1aef9cd4068fa4 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1560945924, LowestAcked: 1560945923, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client Short Header{DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client Dropping Initial keys. 2025/09/11 17:01:50 client -> Sending packet 1 (116 bytes) for connection 85c0ee8d1aef9cd4068fa4, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1560945923, LowestAcked: 1560945923, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Short Header{DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client -> Sending packet 2 (53 bytes) for connection 85c0ee8d1aef9cd4068fa4, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1560945923, LowestAcked: 1560945923, DelayTime: 794.538µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client <- Reading packet 1560945925 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1560945925, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 192µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Peer doesn't await address validation any longer. 2025/09/11 17:01:50 client newly acked packets (2): [0 1] 2025/09/11 17:01:50 client Canceling loss detection timer. 2025/09/11 17:01:50 client Dropping Handshake keys. 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 37b34bc8805b8285e998bc2f3228a01f9d92, StatelessResetToken: 0xcb34ef5252e12d3a0623b24afed72332} 2025/09/11 17:01:50 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:50 client <- &wire.NewTokenFrame{Token: 0x36d162ee49e01718147266b4cb3bd49235c3b5a06c49d1d830f5aa8bb2c04d93d22b614f0a616343f2} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:50 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:50 client -> Sending packet 3 (54 bytes) for connection 85c0ee8d1aef9cd4068fa4, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1560945925, LowestAcked: 1560945923, AckRanges: {{Largest: 1560945925, Smallest: 1560945925}, {Largest: 1560945923, Smallest: 1560945923}}, DelayTime: 120.265µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client <- Reading packet 1560945926 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1560945926, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:50 client -> Sending packet 4 (40 bytes) for connection 85c0ee8d1aef9cd4068fa4, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 8cd9ed072544233e0e95991adf86acb1763a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:50 client Connection 85c0ee8d1aef9cd4068fa4 closed. 2025/09/11 17:01:50 Requesting https://server4:443/aumsyitecd. 2025/09/11 17:01:50 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:50 Increased send buffer size to 14336 kiB 2025/09/11 17:01:50 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:50 Created qlog file: /logs/qlog/4d814076d54625fd469ba4df807f71ddb97c46.sqlog 2025/09/11 17:01:50 client Starting new connection to server4 ([::]:46711 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4d814076d54625fd469ba4df807f71ddb97c46, version v1 2025/09/11 17:01:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:50 client -> Sending packet 0 (1280 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 4d814076d54625fd469ba4df807f71ddb97c46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:50 client -> Sending packet 1 (1280 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 4d814076d54625fd469ba4df807f71ddb97c46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/11 17:01:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:50 client -> Sending packet 2 (1280 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 4d814076d54625fd469ba4df807f71ddb97c46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:50 client -> Sending packet 3 (1280 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 4d814076d54625fd469ba4df807f71ddb97c46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:50 client <- Reading packet 1407019047 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bd2d943ca9bc476ea6b00a19437b93095c2, Token: (empty), PacketNumber: 1407019047, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:50 client Received first packet. Switching destination connection ID to: 8bd2d943ca9bc476ea6b00a19437b93095c2 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (2): [2 3] 2025/09/11 17:01:50 client updated RTT: 34.647704ms (σ: 17.323852ms) 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 282 bytes. 2025/09/11 17:01:50 client <- Reading packet 1407019046 (769 bytes) for connection (empty), Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bd2d943ca9bc476ea6b00a19437b93095c2, PacketNumber: 1407019046, PacketNumberLen: 4, Length: 740, Version: v1} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/11 17:01:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4d814076d54625fd469ba4df807f71ddb97c46, InitialSourceConnectionID: 8bd2d943ca9bc476ea6b00a19437b93095c2, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xdf29aaaf2928889db40cdf6394ec46a1, EnableResetStreamAt: false} 2025/09/11 17:01:50 client <- Reading packet 1407019046 (282 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1407019046, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 75e5ba16a86739d1c1faf4a8dcf2fe542d7f, StatelessResetToken: 0xf067808e5e162f195d6d51fcbea82db9} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b7253cdfd5dfa19add7d7dfed185948e14cb, StatelessResetToken: 0xd6e9a09cf8ff8413c3c8f0fc8c0d112e} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, StatelessResetToken: 0x1fb740d62aa9ffe95e847f19ea76095d} 2025/09/11 17:01:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1407019047, LowestAcked: 1407019047, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client Dropping Initial keys. 2025/09/11 17:01:50 client -> Sending packet 1 (116 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1407019046, LowestAcked: 1407019046, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client -> Sending packet 2 (53 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1407019046, LowestAcked: 1407019046, DelayTime: 830.736µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:50 client -> Sending packet 2 (84 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client -> Sending packet 3 (84 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client <- Reading packet 1407019047 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1407019047, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.PingFrame{} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client <- Reading packet 1407019049 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1407019049, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 884, Data length: 140, Offset + Data length: 1024} 2025/09/11 17:01:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:50 client -> Sending packet 3 (54 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1407019049, LowestAcked: 1407019046, AckRanges: {{Largest: 1407019049, Smallest: 1407019049}, {Largest: 1407019047, Smallest: 1407019046}}, DelayTime: 71.624µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client <- Reading packet 1407019051 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1407019051, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:50 client Dropping Handshake keys. 2025/09/11 17:01:50 client <- &wire.NewTokenFrame{Token: 0x367fcbdfa47995a736e01b01d12d2de4fe5f0a109c6ced1c565ded915abf14bb575b6c78ee5eb9b92b} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 884, Offset + Data length: 884} 2025/09/11 17:01:50 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:50 client -> Sending packet 5 (58 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 1407019051, LowestAcked: 1407019046, AckRanges: {{Largest: 1407019051, Smallest: 1407019051}, {Largest: 1407019049, Smallest: 1407019049}, {Largest: 1407019047, Smallest: 1407019046}}, DelayTime: 112.7µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client Skipping packet number 4 2025/09/11 17:01:50 client -> Sending packet 6 (56 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:50 client -> Sending packet 7 (40 bytes) for connection 4d814076d54625fd469ba4df807f71ddb97c46, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06baee3be525f92f73c7db6c2d7a677c5799, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:50 client Connection 4d814076d54625fd469ba4df807f71ddb97c46 closed. 2025/09/11 17:01:50 Requesting https://server4:443/jhxfwekdtk. 2025/09/11 17:01:50 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:50 Increased send buffer size to 14336 kiB 2025/09/11 17:01:50 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:50 Created qlog file: /logs/qlog/bb8e200013c2fb581241f367c9ca.sqlog 2025/09/11 17:01:50 client Starting new connection to server4 ([::]:50298 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb8e200013c2fb581241f367c9ca, version v1 2025/09/11 17:01:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:50 client -> Sending packet 0 (1280 bytes) for connection bb8e200013c2fb581241f367c9ca, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: bb8e200013c2fb581241f367c9ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/11 17:01:50 client -> Sending packet 1 (1280 bytes) for connection bb8e200013c2fb581241f367c9ca, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: bb8e200013c2fb581241f367c9ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1234, Data length: 280, Offset + Data length: 1514} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:50 client <- Reading packet 54159733 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63ba6d02a94d118170f502cb1c9a7a7aee39, Token: (empty), PacketNumber: 54159733, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:50 client Received first packet. Switching destination connection ID to: 63ba6d02a94d118170f502cb1c9a7a7aee39 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (2): [0 1] 2025/09/11 17:01:50 client updated RTT: 34.469721ms (σ: 17.23486ms) 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 287 bytes. 2025/09/11 17:01:50 client <- Reading packet 54159732 (764 bytes) for connection (empty), Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63ba6d02a94d118170f502cb1c9a7a7aee39, PacketNumber: 54159732, PacketNumberLen: 4, Length: 735, Version: v1} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/11 17:01:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb8e200013c2fb581241f367c9ca, InitialSourceConnectionID: 63ba6d02a94d118170f502cb1c9a7a7aee39, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x777665e358d700d30d58c83a07c798db, EnableResetStreamAt: false} 2025/09/11 17:01:50 client <- Reading packet 54159732 (287 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 54159732, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f19c1a6f8493d54138f150f1c3a828158bca, StatelessResetToken: 0xcf0eb29f3d0b8e633f068b9e2a59c860} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 196fb8d92a0933a39f3083e51344f5591114, StatelessResetToken: 0x442513e178d16d94b131e083292b40df} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, StatelessResetToken: 0x5bffbfeaf6714bb557550e0ff0e2ccc3} 2025/09/11 17:01:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bb8e200013c2fb581241f367c9ca 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 54159733, LowestAcked: 54159733, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client Dropping Initial keys. 2025/09/11 17:01:50 client -> Sending packet 1 (56 bytes) for connection bb8e200013c2fb581241f367c9ca, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 54159732, LowestAcked: 54159732, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client -> Sending packet 1 (49 bytes) for connection bb8e200013c2fb581241f367c9ca, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 54159732, LowestAcked: 54159732, DelayTime: 876.512µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:50 client -> Sending packet 2 (84 bytes) for connection bb8e200013c2fb581241f367c9ca, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client -> Sending packet 3 (84 bytes) for connection bb8e200013c2fb581241f367c9ca, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client <- Reading packet 54159733 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 54159733, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.PingFrame{} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client <- Reading packet 54159734 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 54159734, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:50 client Dropping Handshake keys. 2025/09/11 17:01:50 client <- &wire.NewTokenFrame{Token: 0x36fd32a5c0999939b9a3da58591cd607d2b7f3c5a58259ee3f8d2d02db7b44d12d6a31be06424aa8c7} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:50 client -> Sending packet 3 (69 bytes) for connection bb8e200013c2fb581241f367c9ca, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 54159734, LowestAcked: 54159732, DelayTime: 96.351µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client -> Sending packet 4 (58 bytes) for connection bb8e200013c2fb581241f367c9ca, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client <- Reading packet 54159735 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 54159735, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.PingFrame{} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client <- Reading packet 54159736 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 54159736, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 184µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client newly acked packets (1): [4] 2025/09/11 17:01:50 client updated RTT: 34.322ms (σ: 13.218ms) 2025/09/11 17:01:50 client ECN capability confirmed. 2025/09/11 17:01:50 client Canceling loss detection timer. 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 28c5e4aad33a1b2538a6b3ba401b881993c7, StatelessResetToken: 0x9bb492aff1f423ea46d09e506fb8ef04} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:50 client -> Sending packet 5 (48 bytes) for connection bb8e200013c2fb581241f367c9ca, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 54159736, LowestAcked: 54159732, DelayTime: 89.498µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:50 client -> Sending packet 6 (40 bytes) for connection bb8e200013c2fb581241f367c9ca, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: 06d82a904ad1d8bb57ff1e05a7b4603303cf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:50 client Connection bb8e200013c2fb581241f367c9ca closed. 2025/09/11 17:01:50 Requesting https://server4:443/nbsbxcajuo. 2025/09/11 17:01:50 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:50 Increased send buffer size to 14336 kiB 2025/09/11 17:01:50 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:50 Created qlog file: /logs/qlog/c8cd22ab30ace6cda93e298678113d3a009b58fd.sqlog 2025/09/11 17:01:50 client Starting new connection to server4 ([::]:53536 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c8cd22ab30ace6cda93e298678113d3a009b58fd, version v1 2025/09/11 17:01:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:50 client -> Sending packet 0 (1280 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: c8cd22ab30ace6cda93e298678113d3a009b58fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> Sending packet 1 (1280 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: c8cd22ab30ace6cda93e298678113d3a009b58fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:50 client <- Reading packet 442919510 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8455d95c0d5b57cdd5f4c535f72932c4b36e, Token: (empty), PacketNumber: 442919510, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:50 client Received first packet. Switching destination connection ID to: 8455d95c0d5b57cdd5f4c535f72932c4b36e 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:50 client newly acked packets (2): [0 1] 2025/09/11 17:01:50 client updated RTT: 34.532639ms (σ: 17.266319ms) 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 281 bytes. 2025/09/11 17:01:50 client <- Reading packet 442919509 (770 bytes) for connection (empty), Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8455d95c0d5b57cdd5f4c535f72932c4b36e, PacketNumber: 442919509, PacketNumberLen: 4, Length: 741, Version: v1} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/09/11 17:01:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c8cd22ab30ace6cda93e298678113d3a009b58fd, InitialSourceConnectionID: 8455d95c0d5b57cdd5f4c535f72932c4b36e, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x4b85fffaac074175cd7e2bbe480974c2, EnableResetStreamAt: false} 2025/09/11 17:01:50 client <- Reading packet 442919509 (281 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 442919509, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cad5ead80cff00e1a6128056c4135c226efe, StatelessResetToken: 0xf3108138498f8c492290a02325ebf9b8} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70dd4240df7d3163bc1f2ad3b81723981e70, StatelessResetToken: 0x3be79aefd14d6eddd157887828f327b5} 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, StatelessResetToken: 0x87a396e4209edabfdbfd3fd6eb445449} 2025/09/11 17:01:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 442919510, LowestAcked: 442919510, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:50 client Short Header{DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:50 client Dropping Initial keys. 2025/09/11 17:01:50 client -> Sending packet 1 (56 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, Handshake 2025/09/11 17:01:50 client Long Header{Type: Handshake, DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 442919509, LowestAcked: 442919509, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client -> Sending packet 1 (68 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 442919509, LowestAcked: 442919509, DelayTime: 669.934µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:50 client <- Reading packet 442919510 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 442919510, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.PingFrame{} 2025/09/11 17:01:50 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:50 client <- Reading packet 442919511 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 442919511, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 368µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Peer doesn't await address validation any longer. 2025/09/11 17:01:50 client newly acked packets (2): [0 1] 2025/09/11 17:01:50 client updated RTT: 34.527ms (σ: 12.958ms) 2025/09/11 17:01:50 client ECN capability confirmed. 2025/09/11 17:01:50 client Canceling loss detection timer. 2025/09/11 17:01:50 client Dropping Handshake keys. 2025/09/11 17:01:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c0ba6021eecc2037249a771d4fc63e024c33, StatelessResetToken: 0xc85e8198ac563583e68617751d8a61bd} 2025/09/11 17:01:50 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:50 client <- &wire.NewTokenFrame{Token: 0x36132f7a29d73f15c687f5310c1e8b45cc15b3366fb7edaf01b90af9550dbb0c1f3779c80b6195fade} 2025/09/11 17:01:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:50 client Ignoring all packets below 442919510. 2025/09/11 17:01:50 client -> Sending packet 2 (48 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 442919511, LowestAcked: 442919510, DelayTime: 147.847µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client <- Reading packet 442919513 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 442919513, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.PingFrame{} 2025/09/11 17:01:50 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:50 client -> Sending packet 3 (50 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 442919513, LowestAcked: 442919510, AckRanges: {{Largest: 442919513, Smallest: 442919513}, {Largest: 442919511, Smallest: 442919510}}, DelayTime: 88.606µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:50 client <- Reading packet 442919515 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:50 client Short Header{DestConnectionID: (empty), PacketNumber: 442919515, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:50 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:50 client -> Sending packet 4 (52 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.AckFrame{LargestAcked: 442919515, LowestAcked: 442919510, AckRanges: {{Largest: 442919515, Smallest: 442919515}, {Largest: 442919513, Smallest: 442919513}, {Largest: 442919511, Smallest: 442919510}}, DelayTime: 70.101µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:50 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:50 client -> Sending packet 5 (40 bytes) for connection c8cd22ab30ace6cda93e298678113d3a009b58fd, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:50 client Short Header{DestConnectionID: a6105a4d2ec44fe442eb001435716c0a14e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:50 client Connection c8cd22ab30ace6cda93e298678113d3a009b58fd closed. 2025/09/11 17:01:50 Requesting https://server4:443/ufhltspxda. 2025/09/11 17:01:50 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:50 Increased send buffer size to 14336 kiB 2025/09/11 17:01:50 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:50 Created qlog file: /logs/qlog/52e775b0b1c42e56b5343d8de720a520ee72e9.sqlog 2025/09/11 17:01:50 client Starting new connection to server4 ([::]:33036 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 52e775b0b1c42e56b5343d8de720a520ee72e9, version v1 2025/09/11 17:01:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:50 client -> Sending packet 0 (1280 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 52e775b0b1c42e56b5343d8de720a520ee72e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:50 client -> Sending packet 1 (1280 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, Initial 2025/09/11 17:01:50 client Long Header{Type: Initial, DestConnectionID: 52e775b0b1c42e56b5343d8de720a520ee72e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:50 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/11 17:01:51 client <- Reading packet 1099558834 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d2efdf7201474d0646a7bd92d88e582ab04, Token: (empty), PacketNumber: 1099558834, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:51 client Received first packet. Switching destination connection ID to: 6d2efdf7201474d0646a7bd92d88e582ab04 2025/09/11 17:01:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:51 client newly acked packets (1): [0] 2025/09/11 17:01:51 client updated RTT: 31.990687ms (σ: 15.995343ms) 2025/09/11 17:01:51 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:51 client <- Reading packet 1099558835 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d2efdf7201474d0646a7bd92d88e582ab04, Token: (empty), PacketNumber: 1099558835, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:51 client newly acked packets (1): [1] 2025/09/11 17:01:51 client updated RTT: 32.32ms (σ: 12.656ms) 2025/09/11 17:01:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:51 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/09/11 17:01:51 client <- Reading packet 1099558834 (768 bytes) for connection (empty), Handshake 2025/09/11 17:01:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d2efdf7201474d0646a7bd92d88e582ab04, PacketNumber: 1099558834, PacketNumberLen: 4, Length: 739, Version: v1} 2025/09/11 17:01:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/11 17:01:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 52e775b0b1c42e56b5343d8de720a520ee72e9, InitialSourceConnectionID: 6d2efdf7201474d0646a7bd92d88e582ab04, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x2d81f6ec4951f7b51a98cb52d0b2cf61, EnableResetStreamAt: false} 2025/09/11 17:01:51 client <- Reading packet 1099558834 (283 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558834, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9cbb902725907ca22192396fd061b131b306, StatelessResetToken: 0xef992f6614917615a32744a8c4c8085f} 2025/09/11 17:01:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8eab70b7f0a1858cc3df006aa77de3156b91, StatelessResetToken: 0xffeb7f165de5608f802ccccf2522ca71} 2025/09/11 17:01:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, StatelessResetToken: 0x75632ba59c637c86708887a2715011b4} 2025/09/11 17:01:51 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9 2025/09/11 17:01:51 client Long Header{Type: Initial, DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:51 client -> &wire.AckFrame{LargestAcked: 1099558835, LowestAcked: 1099558834, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client Long Header{Type: Handshake, DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:51 client Dropping Initial keys. 2025/09/11 17:01:51 client -> Sending packet 1 (60 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, Handshake 2025/09/11 17:01:51 client Long Header{Type: Handshake, DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:51 client -> &wire.AckFrame{LargestAcked: 1099558834, LowestAcked: 1099558834, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client -> Sending packet 1 (53 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.AckFrame{LargestAcked: 1099558834, LowestAcked: 1099558834, DelayTime: 734.455µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client -> Sending packet 2 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:51 client <- Reading packet 1099558835 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558835, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.PingFrame{} 2025/09/11 17:01:51 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:51 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:51 client -> Sending packet 3 (53 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.AckFrame{LargestAcked: 1099558835, LowestAcked: 1099558834, DelayTime: 25.263688ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:51 client -> Sending packet 2 (84 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, Handshake 2025/09/11 17:01:51 client Long Header{Type: Handshake, DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:51 client -> Sending packet 3 (84 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, Handshake 2025/09/11 17:01:51 client Long Header{Type: Handshake, DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:51 client <- Reading packet 1099558839 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558839, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.PingFrame{} 2025/09/11 17:01:51 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:51 client -> Sending packet 4 (54 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.AckFrame{LargestAcked: 1099558839, LowestAcked: 1099558834, AckRanges: {{Largest: 1099558839, Smallest: 1099558839}, {Largest: 1099558835, Smallest: 1099558834}}, DelayTime: 104.035µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client <- Reading packet 1099558840 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558840, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a56e1378675154a8d7a56f4571e148911616, StatelessResetToken: 0x4ad015ef35c861c8bdbbf74b3c441e30} 2025/09/11 17:01:51 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:51 client Dropping Handshake keys. 2025/09/11 17:01:51 client <- &wire.NewTokenFrame{Token: 0x36746f2e3e4d3c150a2a8c467e331924541cbe57ac62b3fae937654cca0c6390f80ade4cc44c999b96} 2025/09/11 17:01:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:51 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:51 client -> Sending packet 6 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.AckFrame{LargestAcked: 1099558840, LowestAcked: 1099558834, AckRanges: {{Largest: 1099558840, Smallest: 1099558839}, {Largest: 1099558835, Smallest: 1099558834}}, DelayTime: 125.334µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:51 client Skipping packet number 5 2025/09/11 17:01:51 client -> Sending packet 7 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:51 client <- Reading packet 1099558842 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558842, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 96µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client newly acked packets (1): [6] 2025/09/11 17:01:51 client updated RTT: 32.131ms (σ: 9.868ms) 2025/09/11 17:01:51 client ECN capability confirmed. 2025/09/11 17:01:51 client Ignoring all packets below 1099558841. 2025/09/11 17:01:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:51 client -> Sending packet 9 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 client -> Sending packet 10 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/11 17:01:51 client -> Sending packet 12 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 client -> Sending packet 13 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 client -> Sending packet 14 (1366 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.PingFrame{} 2025/09/11 17:01:51 client <- Reading packet 1099558846 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558846, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 96µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/11 17:01:51 client -> Sending packet 16 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 client -> Sending packet 17 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:51 client <- Reading packet 1099558850 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558850, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:51 client <- &wire.AckFrame{LargestAcked: 16, LowestAcked: 0, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 152µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/11 17:01:51 client newly acked packets (1): [14] 2025/09/11 17:01:51 client -> Sending packet 18 (1409 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:51 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:51 client -> &wire.PingFrame{} 2025/09/11 17:01:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:52 client -> Sending packet 20 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client -> Sending packet 21 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client <- Reading packet 1099558851 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558851, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 21, LowestAcked: 0, AckRanges: {{Largest: 21, Smallest: 20}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 56µs, ECT0: 10, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client newly acked packets (1): [21] 2025/09/11 17:01:52 client updated RTT: 32ms (σ: 7.662ms) 2025/09/11 17:01:52 client lost packet 18 (time threshold) 2025/09/11 17:01:52 client Canceling loss detection timer. 2025/09/11 17:01:52 client <- Reading packet 1099558852 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1099558852, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:52 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:52 client -> Sending packet 22 (1387 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.PingFrame{} 2025/09/11 17:01:52 client -> Sending packet 23 (56 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1099558852, LowestAcked: 1099558842, AckRanges: {{Largest: 1099558852, Smallest: 1099558850}, {Largest: 1099558846, Smallest: 1099558846}, {Largest: 1099558842, Smallest: 1099558842}}, DelayTime: 135.724µs, ECT0: 9, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:52 client -> Sending packet 24 (40 bytes) for connection 52e775b0b1c42e56b5343d8de720a520ee72e9, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 41723be9a5eaeb8266de89b19ce9a332b18a, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:52 client Connection 52e775b0b1c42e56b5343d8de720a520ee72e9 closed. 2025/09/11 17:01:52 Requesting https://server4:443/hmfvhomxbl. 2025/09/11 17:01:52 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:52 Increased send buffer size to 14336 kiB 2025/09/11 17:01:52 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:52 Created qlog file: /logs/qlog/6309215db137a7171ab79d10101910.sqlog 2025/09/11 17:01:52 client Starting new connection to server4 ([::]:53112 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6309215db137a7171ab79d10101910, version v1 2025/09/11 17:01:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:52 client -> Sending packet 0 (1280 bytes) for connection 6309215db137a7171ab79d10101910, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 6309215db137a7171ab79d10101910, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/11 17:01:52 client -> Sending packet 1 (1280 bytes) for connection 6309215db137a7171ab79d10101910, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 6309215db137a7171ab79d10101910, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:52 client <- Reading packet 1306900970 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d9776a726e9e0741f21e7048745d537369e7, Token: (empty), PacketNumber: 1306900970, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:52 client Received first packet. Switching destination connection ID to: d9776a726e9e0741f21e7048745d537369e7 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [0] 2025/09/11 17:01:52 client updated RTT: 32.353847ms (σ: 16.176923ms) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:52 client <- Reading packet 1306900971 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d9776a726e9e0741f21e7048745d537369e7, Token: (empty), PacketNumber: 1306900971, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [1] 2025/09/11 17:01:52 client updated RTT: 32.677ms (σ: 12.781ms) 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 287 bytes. 2025/09/11 17:01:52 client <- Reading packet 1306900970 (764 bytes) for connection (empty), Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d9776a726e9e0741f21e7048745d537369e7, PacketNumber: 1306900970, PacketNumberLen: 4, Length: 735, Version: v1} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/11 17:01:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6309215db137a7171ab79d10101910, InitialSourceConnectionID: d9776a726e9e0741f21e7048745d537369e7, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xf4cfbecd70b5f19037c333168f0011f2, EnableResetStreamAt: false} 2025/09/11 17:01:52 client <- Reading packet 1306900970 (287 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1306900970, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 056d458323093f3e67ea979515b35d28fe9b, StatelessResetToken: 0x6f791a9bc5e1d70c7e3c5e9db257099b} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8c7468194124182e5119295efda4c8f20b02, StatelessResetToken: 0x1ff7e5f5844a28e0053452184fa3feaf} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 68403a79a49af1619816118417e05f8caa72, StatelessResetToken: 0xe910ee873eba80aeab9f1724712f2e95} 2025/09/11 17:01:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6309215db137a7171ab79d10101910 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 68403a79a49af1619816118417e05f8caa72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1306900971, LowestAcked: 1306900970, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 68403a79a49af1619816118417e05f8caa72, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:52 client Dropping Initial keys. 2025/09/11 17:01:52 client -> Sending packet 1 (116 bytes) for connection 6309215db137a7171ab79d10101910, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 68403a79a49af1619816118417e05f8caa72, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1306900970, LowestAcked: 1306900970, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client -> Sending packet 2 (53 bytes) for connection 6309215db137a7171ab79d10101910, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1306900970, LowestAcked: 1306900970, DelayTime: 1.122981ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client <- Reading packet 1306900971 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1306900971, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client <- Reading packet 1306900972 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1306900972, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 200µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Peer doesn't await address validation any longer. 2025/09/11 17:01:52 client newly acked packets (2): [0 1] 2025/09/11 17:01:52 client Canceling loss detection timer. 2025/09/11 17:01:52 client Dropping Handshake keys. 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 16e413589a487cb2f3b8e1b3c42d35497033, StatelessResetToken: 0x33cc39fd73a6c5004e3c2bb7179f76de} 2025/09/11 17:01:52 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:52 client <- &wire.NewTokenFrame{Token: 0x36c8cb81a6f98f9a30ecf34847b2ffd78b1b78e0731434619b06fac2aec9bf0d592b8968be54df3299} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:01:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:52 client -> Sending packet 3 (52 bytes) for connection 6309215db137a7171ab79d10101910, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1306900972, LowestAcked: 1306900970, DelayTime: 118.873µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client <- Reading packet 1306900974 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1306900974, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:52 client -> Sending packet 4 (54 bytes) for connection 6309215db137a7171ab79d10101910, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1306900974, LowestAcked: 1306900970, AckRanges: {{Largest: 1306900974, Smallest: 1306900974}, {Largest: 1306900972, Smallest: 1306900970}}, DelayTime: 90.871µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:52 client <- Reading packet 1306900975 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1306900975, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client <- Reading packet 1306900976 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1306900976, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:01:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:52 client -> Sending packet 5 (54 bytes) for connection 6309215db137a7171ab79d10101910, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1306900976, LowestAcked: 1306900970, AckRanges: {{Largest: 1306900976, Smallest: 1306900974}, {Largest: 1306900972, Smallest: 1306900970}}, DelayTime: 65.352µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:52 client -> Sending packet 6 (40 bytes) for connection 6309215db137a7171ab79d10101910, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 68403a79a49af1619816118417e05f8caa72, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:52 client Connection 6309215db137a7171ab79d10101910 closed. 2025/09/11 17:01:52 Requesting https://server4:443/lkwwqpvsnu. 2025/09/11 17:01:52 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:52 Increased send buffer size to 14336 kiB 2025/09/11 17:01:52 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:52 Created qlog file: /logs/qlog/1c2ae5bdd1c3e9761b.sqlog 2025/09/11 17:01:52 client Starting new connection to server4 ([::]:47870 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1c2ae5bdd1c3e9761b, version v1 2025/09/11 17:01:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:52 client -> Sending packet 0 (1280 bytes) for connection 1c2ae5bdd1c3e9761b, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 1c2ae5bdd1c3e9761b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:52 client -> Sending packet 1 (1280 bytes) for connection 1c2ae5bdd1c3e9761b, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 1c2ae5bdd1c3e9761b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/09/11 17:01:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:52 client -> Sending packet 2 (1280 bytes) for connection 1c2ae5bdd1c3e9761b, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 1c2ae5bdd1c3e9761b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/11 17:01:52 client -> Sending packet 3 (1280 bytes) for connection 1c2ae5bdd1c3e9761b, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 1c2ae5bdd1c3e9761b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:52 client <- Reading packet 212839870 (1200 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6f176cc6f0b9101385de83003846778ed846, Token: (empty), PacketNumber: 212839870, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/09/11 17:01:52 client Received first packet. Switching destination connection ID to: 6f176cc6f0b9101385de83003846778ed846 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [2] 2025/09/11 17:01:52 client updated RTT: 32.951453ms (σ: 16.475726ms) 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client -> Sending packet 4 (1280 bytes) for connection 1c2ae5bdd1c3e9761b, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 6f176cc6f0b9101385de83003846778ed846, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 212839870, LowestAcked: 212839870, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:52 client <- Reading packet 212839871 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6f176cc6f0b9101385de83003846778ed846, Token: (empty), PacketNumber: 212839871, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [3] 2025/09/11 17:01:52 client updated RTT: 33.17ms (σ: 12.794ms) 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 292 bytes. 2025/09/11 17:01:52 client <- Reading packet 212839869 (757 bytes) for connection (empty), Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6f176cc6f0b9101385de83003846778ed846, PacketNumber: 212839869, PacketNumberLen: 4, Length: 728, Version: v1} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/11 17:01:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1c2ae5bdd1c3e9761b, InitialSourceConnectionID: 6f176cc6f0b9101385de83003846778ed846, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x519eda622452b064074c4e27fc74e5e6, EnableResetStreamAt: false} 2025/09/11 17:01:52 client <- Reading packet 212839869 (292 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 212839869, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 77df19cfcf5a41682ad4cbed2f16460f4d80, StatelessResetToken: 0xed2167967df14057ce794c74f3ba03fd} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 73dfa5d3269c877becc86e911d4e24694343, StatelessResetToken: 0xbae8f6137067795cd3c119004610d8a9} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, StatelessResetToken: 0x5ed11952f09ac00c7272d57626a5ff7c} 2025/09/11 17:01:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1c2ae5bdd1c3e9761b 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 212839871, LowestAcked: 212839870, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client Short Header{DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client Dropping Initial keys. 2025/09/11 17:01:52 client -> Sending packet 1 (56 bytes) for connection 1c2ae5bdd1c3e9761b, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 212839869, LowestAcked: 212839869, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client -> Sending packet 1 (49 bytes) for connection 1c2ae5bdd1c3e9761b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 212839869, LowestAcked: 212839869, DelayTime: 777.276µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:52 client <- Reading packet 212839872 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 212839872, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:52 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:52 client -> Sending packet 2 (50 bytes) for connection 1c2ae5bdd1c3e9761b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 212839872, LowestAcked: 212839869, AckRanges: {{Largest: 212839872, Smallest: 212839872}, {Largest: 212839869, Smallest: 212839869}}, DelayTime: 78.978µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client <- Reading packet 212839873 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 212839873, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.552ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Peer doesn't await address validation any longer. 2025/09/11 17:01:52 client newly acked packets (1): [0] 2025/09/11 17:01:52 client Canceling loss detection timer. 2025/09/11 17:01:52 client Dropping Handshake keys. 2025/09/11 17:01:52 client <- Reading packet 212839874 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 212839874, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4679f3f746da6e9c557a63fcf97521dd789f, StatelessResetToken: 0xceb15e43f511afc55b1e88d4ffcfecf9} 2025/09/11 17:01:52 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:52 client <- &wire.NewTokenFrame{Token: 0x36c0b56c50163875d06c0cd653ca030fad36ba71eaa0e050d94b3a56176c93a262cc945825bf012d8a} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:52 client -> Sending packet 3 (40 bytes) for connection 1c2ae5bdd1c3e9761b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 453d4269a1727aeba0c8b606318aebeeead8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:52 client Connection 1c2ae5bdd1c3e9761b closed. 2025/09/11 17:01:52 Requesting https://server4:443/djnwwtjrxm. 2025/09/11 17:01:52 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:52 Increased send buffer size to 14336 kiB 2025/09/11 17:01:52 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:52 Created qlog file: /logs/qlog/49c1430d5b0530f060ff68e218db4e9fa43e.sqlog 2025/09/11 17:01:52 client Starting new connection to server4 ([::]:60218 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 49c1430d5b0530f060ff68e218db4e9fa43e, version v1 2025/09/11 17:01:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:52 client -> Sending packet 0 (1280 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 49c1430d5b0530f060ff68e218db4e9fa43e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/11 17:01:52 client -> Sending packet 1 (1280 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 49c1430d5b0530f060ff68e218db4e9fa43e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 1230, Data length: 274, Offset + Data length: 1504} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:52 client <- Reading packet 1740538983 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 78955012e4ad377fd1f7183b620f5fbf1cf1, Token: (empty), PacketNumber: 1740538983, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:52 client Received first packet. Switching destination connection ID to: 78955012e4ad377fd1f7183b620f5fbf1cf1 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [0] 2025/09/11 17:01:52 client updated RTT: 32.086678ms (σ: 16.043339ms) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:52 client <- Reading packet 1740538984 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 78955012e4ad377fd1f7183b620f5fbf1cf1, Token: (empty), PacketNumber: 1740538984, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [1] 2025/09/11 17:01:52 client updated RTT: 32.405ms (σ: 12.671ms) 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 285 bytes. 2025/09/11 17:01:52 client <- Reading packet 1740538983 (766 bytes) for connection (empty), Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 78955012e4ad377fd1f7183b620f5fbf1cf1, PacketNumber: 1740538983, PacketNumberLen: 4, Length: 737, Version: v1} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/11 17:01:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 49c1430d5b0530f060ff68e218db4e9fa43e, InitialSourceConnectionID: 78955012e4ad377fd1f7183b620f5fbf1cf1, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x4180627b6da3e03329e002ab1c8d6bfc, EnableResetStreamAt: false} 2025/09/11 17:01:52 client <- Reading packet 1740538983 (285 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1740538983, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 61b058acdd662b0d7572706187a502a0d6a1, StatelessResetToken: 0xcce9130e1dcb9e2e8034687e9e547eec} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b7dbf65a215056d0c9805dcf06fdf80a505, StatelessResetToken: 0xd8c917acb1d5206f8597048d5957ab8f} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, StatelessResetToken: 0xd1e326e13f82cfabc25e6691a08f8e89} 2025/09/11 17:01:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1740538984, LowestAcked: 1740538983, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client Short Header{DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client Dropping Initial keys. 2025/09/11 17:01:52 client -> Sending packet 1 (60 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1740538983, LowestAcked: 1740538983, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client -> Sending packet 1 (53 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1740538983, LowestAcked: 1740538983, DelayTime: 690.724µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client <- Reading packet 1740538984 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1740538984, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client <- Reading packet 1740538985 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1740538985, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 57f433310a39cd2ec4d3f53cce0abf83e780, StatelessResetToken: 0xd5a2d475784add38a03cbc584f543ba4} 2025/09/11 17:01:52 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:52 client Dropping Handshake keys. 2025/09/11 17:01:52 client <- &wire.NewTokenFrame{Token: 0x36cca48d2d09c836f7cf485bf4ba06f8db30103100a829e43c77923d7442736cd4fa6df3f9ded91146} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:52 client -> Sending packet 2 (52 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1740538985, LowestAcked: 1740538983, DelayTime: 142.958µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client <- Reading packet 1740538986 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1740538986, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:52 client -> Sending packet 3 (40 bytes) for connection 49c1430d5b0530f060ff68e218db4e9fa43e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: cf5ef3e4a400df092fafda3af9b82850f75c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:52 client Connection 49c1430d5b0530f060ff68e218db4e9fa43e closed. 2025/09/11 17:01:52 Requesting https://server4:443/bpchyhqaso. 2025/09/11 17:01:52 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:52 Increased send buffer size to 14336 kiB 2025/09/11 17:01:52 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:52 Created qlog file: /logs/qlog/b9853f7e57eccf48.sqlog 2025/09/11 17:01:52 client Starting new connection to server4 ([::]:40707 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b9853f7e57eccf48, version v1 2025/09/11 17:01:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:52 client -> Sending packet 0 (1280 bytes) for connection b9853f7e57eccf48, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: b9853f7e57eccf48, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:01:52 client -> Sending packet 1 (1280 bytes) for connection b9853f7e57eccf48, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: b9853f7e57eccf48, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 1240, Data length: 270, Offset + Data length: 1510} 2025/09/11 17:01:52 client <- Reading packet 724213009 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ecc9c5a8d78b9677090db14fda1f009d1722, Token: (empty), PacketNumber: 724213009, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:52 client Received first packet. Switching destination connection ID to: ecc9c5a8d78b9677090db14fda1f009d1722 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [0] 2025/09/11 17:01:52 client updated RTT: 32.021325ms (σ: 16.010662ms) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:52 client <- Reading packet 724213010 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ecc9c5a8d78b9677090db14fda1f009d1722, Token: (empty), PacketNumber: 724213010, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [1] 2025/09/11 17:01:52 client updated RTT: 32.33ms (σ: 12.626ms) 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 294 bytes. 2025/09/11 17:01:52 client <- Reading packet 724213009 (757 bytes) for connection (empty), Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ecc9c5a8d78b9677090db14fda1f009d1722, PacketNumber: 724213009, PacketNumberLen: 4, Length: 728, Version: v1} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/11 17:01:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b9853f7e57eccf48, InitialSourceConnectionID: ecc9c5a8d78b9677090db14fda1f009d1722, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x2e751ccbd034d9fba3e5155de5274058, EnableResetStreamAt: false} 2025/09/11 17:01:52 client <- Reading packet 724213009 (294 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 724213009, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e9a6d107a56c724ac4d6e4e1d12343ff441d, StatelessResetToken: 0x4850540baf60355acc74b4e2b401c06c} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a56a79a1c06cc42e3eecc982b08df2a050db, StatelessResetToken: 0x8739028ba6a08c44a29b9ca5b9130cfa} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34e58ff2e22985b8287169af561afee05c1b, StatelessResetToken: 0x3464e97af6f5e31e3b2f87e0aa7460cc} 2025/09/11 17:01:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b9853f7e57eccf48 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 724213010, LowestAcked: 724213009, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client Short Header{DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:52 client Dropping Initial keys. 2025/09/11 17:01:52 client -> Sending packet 1 (56 bytes) for connection b9853f7e57eccf48, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 724213009, LowestAcked: 724213009, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client -> Sending packet 1 (49 bytes) for connection b9853f7e57eccf48, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 724213009, LowestAcked: 724213009, DelayTime: 577.572µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client -> Sending packet 2 (56 bytes) for connection b9853f7e57eccf48, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client <- Reading packet 724213010 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 724213010, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client <- Reading packet 724213011 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 724213011, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 232µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Peer doesn't await address validation any longer. 2025/09/11 17:01:52 client newly acked packets (2): [0 2] 2025/09/11 17:01:52 client updated RTT: 32.571ms (σ: 9.952ms) 2025/09/11 17:01:52 client ECN capability confirmed. 2025/09/11 17:01:52 client Canceling loss detection timer. 2025/09/11 17:01:52 client Dropping Handshake keys. 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7db2286827bb1d8539397b12c8123b8a4eb9, StatelessResetToken: 0x5ec6040cca55b56ec819510a1dce332c} 2025/09/11 17:01:52 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:52 client <- &wire.NewTokenFrame{Token: 0x3605e81b5e4afc6e2ed8cc9cd62b92cdb7fa431d6462317bda79ee576be47f329405915b01ab8da641} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 842, Offset + Data length: 842} 2025/09/11 17:01:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:52 client -> Sending packet 3 (48 bytes) for connection b9853f7e57eccf48, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 724213011, LowestAcked: 724213009, DelayTime: 176.391µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client <- Reading packet 724213012 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 724213012, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 842, Data length: 182, Offset + Data length: 1024} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:52 client -> Sending packet 4 (40 bytes) for connection b9853f7e57eccf48, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 34e58ff2e22985b8287169af561afee05c1b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:52 client Connection b9853f7e57eccf48 closed. 2025/09/11 17:01:52 Requesting https://server4:443/dgicdoqdrz. 2025/09/11 17:01:52 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:52 Increased send buffer size to 14336 kiB 2025/09/11 17:01:52 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:52 Created qlog file: /logs/qlog/a7ea0d9c8564b8f413f2d1961d456c38743cdb.sqlog 2025/09/11 17:01:52 client Starting new connection to server4 ([::]:60535 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a7ea0d9c8564b8f413f2d1961d456c38743cdb, version v1 2025/09/11 17:01:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:52 client -> Sending packet 0 (1280 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: a7ea0d9c8564b8f413f2d1961d456c38743cdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:52 client -> Sending packet 1 (1280 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: a7ea0d9c8564b8f413f2d1961d456c38743cdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/11 17:01:52 client <- Reading packet 1417688379 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bcf07a43aa6b5bd0b924ac134bcea245be10, Token: (empty), PacketNumber: 1417688379, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:52 client Received first packet. Switching destination connection ID to: bcf07a43aa6b5bd0b924ac134bcea245be10 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [0] 2025/09/11 17:01:52 client updated RTT: 32.063324ms (σ: 16.031662ms) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:52 client <- Reading packet 1417688380 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bcf07a43aa6b5bd0b924ac134bcea245be10, Token: (empty), PacketNumber: 1417688380, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:52 client newly acked packets (1): [1] 2025/09/11 17:01:52 client updated RTT: 32.363ms (σ: 12.624ms) 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/09/11 17:01:52 client <- Reading packet 1417688379 (768 bytes) for connection (empty), Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bcf07a43aa6b5bd0b924ac134bcea245be10, PacketNumber: 1417688379, PacketNumberLen: 4, Length: 739, Version: v1} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/11 17:01:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a7ea0d9c8564b8f413f2d1961d456c38743cdb, InitialSourceConnectionID: bcf07a43aa6b5bd0b924ac134bcea245be10, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x376e4800b2d56bd10c88163a87af71ec, EnableResetStreamAt: false} 2025/09/11 17:01:52 client <- Reading packet 1417688379 (283 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1417688379, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e45fd631c70ff6d326fbabfec9e76741d8d, StatelessResetToken: 0xcf387caf4a2ed95ff6d8b9c12b514e5d} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fd0a7c2abec607f71ade5d2e30645eaaf748, StatelessResetToken: 0x90f7cb1bbe5fb09c789591d237d6d99e} 2025/09/11 17:01:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76139a880377b443a78280d232288e7b7d36, StatelessResetToken: 0x8992324a23fe2070525ca4e846ea6e8a} 2025/09/11 17:01:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb 2025/09/11 17:01:52 client Long Header{Type: Initial, DestConnectionID: 76139a880377b443a78280d232288e7b7d36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1417688380, LowestAcked: 1417688379, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 76139a880377b443a78280d232288e7b7d36, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:52 client Dropping Initial keys. 2025/09/11 17:01:52 client -> Sending packet 1 (116 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 76139a880377b443a78280d232288e7b7d36, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1417688379, LowestAcked: 1417688379, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:52 client -> Sending packet 2 (53 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1417688379, LowestAcked: 1417688379, DelayTime: 667.042µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:52 client -> Sending packet 2 (84 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 76139a880377b443a78280d232288e7b7d36, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client -> Sending packet 3 (84 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, Handshake 2025/09/11 17:01:52 client Long Header{Type: Handshake, DestConnectionID: 76139a880377b443a78280d232288e7b7d36, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:52 client <- Reading packet 1417688380 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1417688380, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.PingFrame{} 2025/09/11 17:01:52 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:52 client <- Reading packet 1417688381 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1417688381, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 82.864ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client Peer doesn't await address validation any longer. 2025/09/11 17:01:52 client newly acked packets (1): [1] 2025/09/11 17:01:52 client lost packet 0 (time threshold) 2025/09/11 17:01:52 client Canceling loss detection timer. 2025/09/11 17:01:52 client Dropping Handshake keys. 2025/09/11 17:01:52 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:52 client <- &wire.NewTokenFrame{Token: 0x369bb3b1f9fc8185b1116e05a3dd0e940112d874b8eda89f9240a4f9081126567cacea62be676844ee} 2025/09/11 17:01:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 884, Offset + Data length: 884} 2025/09/11 17:01:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:52 client -> Sending packet 3 (54 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:52 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:52 client -> &wire.AckFrame{LargestAcked: 1417688381, LowestAcked: 1417688379, DelayTime: 111.228µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:53 client -> Sending packet 5 (39 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:53 client -> Sending packet 6 (39 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:53 client <- Reading packet 1417688383 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1417688383, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.PingFrame{} 2025/09/11 17:01:53 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:53 client -> Sending packet 7 (54 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1417688383, LowestAcked: 1417688379, AckRanges: {{Largest: 1417688383, Smallest: 1417688383}, {Largest: 1417688381, Smallest: 1417688379}}, DelayTime: 86.471µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client <- Reading packet 1417688385 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1417688385, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 884, Data length: 140, Offset + Data length: 1024} 2025/09/11 17:01:53 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:53 client -> Sending packet 8 (56 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1417688385, LowestAcked: 1417688379, AckRanges: {{Largest: 1417688385, Smallest: 1417688385}, {Largest: 1417688383, Smallest: 1417688383}, {Largest: 1417688381, Smallest: 1417688379}}, DelayTime: 60.173µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:53 client -> Sending packet 9 (40 bytes) for connection a7ea0d9c8564b8f413f2d1961d456c38743cdb, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 76139a880377b443a78280d232288e7b7d36, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:53 client Connection a7ea0d9c8564b8f413f2d1961d456c38743cdb closed. 2025/09/11 17:01:53 Requesting https://server4:443/imvoyzewvf. 2025/09/11 17:01:53 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:53 Increased send buffer size to 14336 kiB 2025/09/11 17:01:53 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:53 Created qlog file: /logs/qlog/c2eb136253bf0766f48ddc.sqlog 2025/09/11 17:01:53 client Starting new connection to server4 ([::]:56206 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c2eb136253bf0766f48ddc, version v1 2025/09/11 17:01:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:53 client -> Sending packet 0 (1280 bytes) for connection c2eb136253bf0766f48ddc, Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: c2eb136253bf0766f48ddc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:01:53 client -> Sending packet 1 (1280 bytes) for connection c2eb136253bf0766f48ddc, Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: c2eb136253bf0766f48ddc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:53 client <- Reading packet 1949442706 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19579d96c2b33e3b0573292e576238992c5f, Token: (empty), PacketNumber: 1949442706, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:53 client Received first packet. Switching destination connection ID to: 19579d96c2b33e3b0573292e576238992c5f 2025/09/11 17:01:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:53 client newly acked packets (1): [0] 2025/09/11 17:01:53 client updated RTT: 32.223875ms (σ: 16.111937ms) 2025/09/11 17:01:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:53 client -> Sending packet 2 (1280 bytes) for connection c2eb136253bf0766f48ddc, Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:53 client -> Sending packet 3 (1280 bytes) for connection c2eb136253bf0766f48ddc, Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:53 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:53 client <- Reading packet 1949442708 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19579d96c2b33e3b0573292e576238992c5f, Token: (empty), PacketNumber: 1949442708, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:53 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:53 client newly acked packets (1): [3] 2025/09/11 17:01:53 client updated RTT: 32.483ms (σ: 12.604ms) 2025/09/11 17:01:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:53 client Parsed a coalesced packet. Part 2: 760 bytes. Remaining: 289 bytes. 2025/09/11 17:01:53 client <- Reading packet 1949442707 (760 bytes) for connection (empty), Handshake 2025/09/11 17:01:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 1949442707, PacketNumberLen: 4, Length: 731, Version: v1} 2025/09/11 17:01:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/09/11 17:01:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c2eb136253bf0766f48ddc, InitialSourceConnectionID: 19579d96c2b33e3b0573292e576238992c5f, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xc96ba8c439b14bab16cf81ee53e848e7, EnableResetStreamAt: false} 2025/09/11 17:01:53 client <- Reading packet 1949442707 (289 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442707, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c2eb136253bf0766f48ddc 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1112, Version: v1} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442708, LowestAcked: 1949442706, AckRanges: {{Largest: 1949442708, Smallest: 1949442708}, {Largest: 1949442706, Smallest: 1949442706}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client Long Header{Type: Handshake, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:53 client Short Header{DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:53 client Dropping Initial keys. 2025/09/11 17:01:53 client -> Sending packet 1 (60 bytes) for connection c2eb136253bf0766f48ddc, Handshake 2025/09/11 17:01:53 client Long Header{Type: Handshake, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442707, LowestAcked: 1949442707, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:53 client -> Sending packet 2 (84 bytes) for connection c2eb136253bf0766f48ddc, Handshake 2025/09/11 17:01:53 client Long Header{Type: Handshake, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:53 client -> Sending packet 3 (84 bytes) for connection c2eb136253bf0766f48ddc, Handshake 2025/09/11 17:01:53 client Long Header{Type: Handshake, DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:53 client <- Reading packet 1949442708 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442708, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.PingFrame{} 2025/09/11 17:01:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:53 client -> Sending packet 1 (52 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442708, LowestAcked: 1949442707, DelayTime: 63.489µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client <- Reading packet 1949442709 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442709, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:53 client Dropping Handshake keys. 2025/09/11 17:01:53 client <- &wire.NewTokenFrame{Token: 0x36df9e58cb4c04a9b787812f8e1daad8096a88908077d2f7df2989b64c1698a96c52ff7d60c18c89fd} 2025/09/11 17:01:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:53 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:53 client -> Sending packet 3 (71 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442709, LowestAcked: 1949442707, DelayTime: 94.567µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:53 client -> Sending packet 4 (56 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:53 client <- Reading packet 1949442711 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442711, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.PingFrame{} 2025/09/11 17:01:53 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:53 client -> Sending packet 5 (54 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442711, LowestAcked: 1949442707, AckRanges: {{Largest: 1949442711, Smallest: 1949442711}, {Largest: 1949442709, Smallest: 1949442707}}, DelayTime: 64.831µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client <- Reading packet 1949442712 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442712, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.PingFrame{} 2025/09/11 17:01:53 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:53 client <- Reading packet 1949442713 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442713, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:53 client <- &wire.NewTokenFrame{Token: 0x36df9e58cb4c04a9b787812f8e1daad8096a88908077d2f7df2989b64c1698a96c52ff7d60c18c89fd} 2025/09/11 17:01:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:53 client -> Sending packet 6 (54 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 19579d96c2b33e3b0573292e576238992c5f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442713, LowestAcked: 1949442707, AckRanges: {{Largest: 1949442713, Smallest: 1949442711}, {Largest: 1949442709, Smallest: 1949442707}}, DelayTime: 84.739µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client <- Reading packet 1949442714 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442714, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c9a2b68c85becf12d7ab0e646bfdd93d5ce2, StatelessResetToken: 0xdf0a333049985364d60216023a053a65} 2025/09/11 17:01:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c1a856fda8cc61a2dbaeaa798ad1b9efdf87, StatelessResetToken: 0xecdd2223f76cddfa752cb15698268721} 2025/09/11 17:01:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, StatelessResetToken: 0x8217be4af4d89086e8b722212b32d9c8} 2025/09/11 17:01:53 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:53 client -> Sending packet 7 (56 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442714, LowestAcked: 1949442707, AckRanges: {{Largest: 1949442714, Smallest: 1949442711}, {Largest: 1949442709, Smallest: 1949442707}}, DelayTime: 113.202µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:53 client <- Reading packet 1949442717 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442717, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9422333ccd7be184b63f6cda8e53ba281611, StatelessResetToken: 0x279975d1ef5c0af23044ccf84adf436c} 2025/09/11 17:01:53 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:53 client -> Sending packet 8 (1366 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.PingFrame{} 2025/09/11 17:01:53 client -> Sending packet 9 (56 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442717, LowestAcked: 1949442707, AckRanges: {{Largest: 1949442717, Smallest: 1949442717}, {Largest: 1949442714, Smallest: 1949442711}, {Largest: 1949442709, Smallest: 1949442707}}, DelayTime: 127.709µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client <- Reading packet 1949442718 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442718, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9422333ccd7be184b63f6cda8e53ba281611, StatelessResetToken: 0x279975d1ef5c0af23044ccf84adf436c} 2025/09/11 17:01:53 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:53 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:53 client -> Sending packet 10 (57 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.AckFrame{LargestAcked: 1949442718, LowestAcked: 1949442707, AckRanges: {{Largest: 1949442718, Smallest: 1949442717}, {Largest: 1949442714, Smallest: 1949442711}, {Largest: 1949442709, Smallest: 1949442707}}, DelayTime: 25.24861ms, ECT0: 9, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/11 17:01:53 client -> Sending packet 12 (56 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:53 client Skipping packet number 11 2025/09/11 17:01:53 client -> Sending packet 13 (39 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: Not-ECT) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:53 client <- Reading packet 1949442719 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1949442719, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:53 client <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 1, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 1, Smallest: 1}}, DelayTime: 64µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:53 client newly acked packets (2): [12 13] 2025/09/11 17:01:53 client updated RTT: 32.455ms (σ: 9.507ms) 2025/09/11 17:01:53 client ECN capability confirmed. 2025/09/11 17:01:53 client lost packet 8 (time threshold) 2025/09/11 17:01:53 client Canceling loss detection timer. 2025/09/11 17:01:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:53 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:53 client -> Sending packet 14 (1323 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.PingFrame{} 2025/09/11 17:01:53 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:53 client -> Sending packet 15 (40 bytes) for connection c2eb136253bf0766f48ddc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:53 client Short Header{DestConnectionID: 2e92a8436c3c8be24e19b115dc0a60e1e064, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:53 client Connection c2eb136253bf0766f48ddc closed. 2025/09/11 17:01:53 Requesting https://server4:443/myatagwxha. 2025/09/11 17:01:53 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:53 Increased send buffer size to 14336 kiB 2025/09/11 17:01:53 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:53 Created qlog file: /logs/qlog/6898c4112dc5ec310896fdd9aded0349f5.sqlog 2025/09/11 17:01:53 client Starting new connection to server4 ([::]:45323 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6898c4112dc5ec310896fdd9aded0349f5, version v1 2025/09/11 17:01:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:53 client -> Sending packet 0 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/11 17:01:53 client -> Sending packet 1 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:53 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:53 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/11 17:01:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:54 client -> Sending packet 2 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:54 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:54 client -> Sending packet 3 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:54 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/11 17:01:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:54 client -> Sending packet 4 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:54 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:54 client -> Sending packet 5 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:54 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/11 17:01:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/11 17:01:55 client -> Sending packet 6 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:55 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/11 17:01:55 client -> Sending packet 7 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:55 client Long Header{Type: Initial, DestConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/11 17:01:55 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/11 17:01:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:55 client <- Reading packet 628621348 (1200 bytes) for connection (empty), Initial 2025/09/11 17:01:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, Token: (empty), PacketNumber: 628621348, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/09/11 17:01:55 client Received first packet. Switching destination connection ID to: 1f2214ecb808e5097c7d9b261f57bb48e3b1 2025/09/11 17:01:55 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/11 17:01:55 client newly acked packets (1): [6] 2025/09/11 17:01:55 client updated RTT: 33.090146ms (σ: 16.545073ms) 2025/09/11 17:01:55 client <- &wire.PingFrame{} 2025/09/11 17:01:55 client -> Sending packet 8 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:55 client Long Header{Type: Initial, DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:55 client -> &wire.AckFrame{LargestAcked: 628621348, LowestAcked: 628621348, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/11 17:01:56 client -> Sending packet 9 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 client -> Sending packet 10 (1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/11 17:01:56 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/09/11 17:01:56 client <- Reading packet 628621350 (144 bytes) for connection (empty), Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, Token: (empty), PacketNumber: 628621350, PacketNumberLen: 4, Length: 114, Version: v1} 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 291 bytes. 2025/09/11 17:01:56 client <- Reading packet 628621348 (765 bytes) for connection (empty), Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, PacketNumber: 628621348, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/11 17:01:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6898c4112dc5ec310896fdd9aded0349f5, InitialSourceConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd0822cb1033aca1009beb47e192674a7, EnableResetStreamAt: false} 2025/09/11 17:01:56 client <- Reading packet 628621348 (291 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 628621348, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 628621350, LowestAcked: 628621348, AckRanges: {{Largest: 628621350, Smallest: 628621350}, {Largest: 628621348, Smallest: 628621348}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:56 client Dropping Initial keys. 2025/09/11 17:01:56 client -> Sending packet 1 (109 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 628621348, LowestAcked: 628621348, DelayTime: 0s} 2025/09/11 17:01:56 client Short Header{DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:56 client <- Reading packet 628621349 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 628621349, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.PingFrame{} 2025/09/11 17:01:56 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:56 client -> Sending packet 1 (48 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 628621349, LowestAcked: 628621348, DelayTime: 87.284µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client <- Reading packet 628621350 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 628621350, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:56 client Dropping Handshake keys. 2025/09/11 17:01:56 client <- &wire.NewTokenFrame{Token: 0x365f4e822d827ad778a0c3564fc95e57fa7ac5a197f3e933c8020d5f93e98699b6f9320c8089b0df05} 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:56 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/09/11 17:01:56 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:56 client <- Reading packet 628621351 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 628621351, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/09/11 17:01:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:56 client -> Sending packet 2 (48 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 628621351, LowestAcked: 628621348, DelayTime: 82.785µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:56 client -> Sending packet 3 (40 bytes) for connection 6898c4112dc5ec310896fdd9aded0349f5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 1f2214ecb808e5097c7d9b261f57bb48e3b1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:56 client Connection 6898c4112dc5ec310896fdd9aded0349f5 closed. 2025/09/11 17:01:56 Requesting https://server4:443/njszbchmxc. 2025/09/11 17:01:56 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:56 Increased send buffer size to 14336 kiB 2025/09/11 17:01:56 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:56 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:56 Created qlog file: /logs/qlog/4dd4e3331623435fd970.sqlog 2025/09/11 17:01:56 client Starting new connection to server4 ([::]:59201 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4dd4e3331623435fd970, version v1 2025/09/11 17:01:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:56 client -> Sending packet 0 (1280 bytes) for connection 4dd4e3331623435fd970, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 4dd4e3331623435fd970, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/11 17:01:56 client -> Sending packet 1 (1280 bytes) for connection 4dd4e3331623435fd970, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 4dd4e3331623435fd970, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1238, Data length: 280, Offset + Data length: 1518} 2025/09/11 17:01:56 client updated RTT: 33.274944ms (σ: 16.637472ms) 2025/09/11 17:01:56 client <- Received Retry: 2025/09/11 17:01:56 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 94f994e83a0c61a183706f589dc533f0eac3, Token: 0xb7bbefc55ac2b5d9c804a2f09897a1a7f5c018834e38f5f2a1bc6ead14a78653081d112c4557eb2762080a51b397318804e21e2bbe3893be8daee6f99319fb7b5814e9a034198d2bd76be07931e87359c7115bf7ec1337de4e07, Version: v1} 2025/09/11 17:01:56 client Switching destination connection ID to: 94f994e83a0c61a183706f589dc533f0eac3 2025/09/11 17:01:56 client -> Sending packet 2 (1280 bytes) for connection 4dd4e3331623435fd970, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 94f994e83a0c61a183706f589dc533f0eac3, SrcConnectionID: (empty), Token: 0xb7bbefc55ac2b5d9c804a2f09897a1a7f5c018834e38f5f2a1bc6ead14a78653081d112c4557eb2762080a51b397318804e21e2bbe3893be8daee6f99319fb7b5814e9a034198d2bd76be07931e87359c7115bf7ec1337de4e07, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:56 client -> Sending packet 3 (1280 bytes) for connection 4dd4e3331623435fd970, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 94f994e83a0c61a183706f589dc533f0eac3, SrcConnectionID: (empty), Token: 0xb7bbefc55ac2b5d9c804a2f09897a1a7f5c018834e38f5f2a1bc6ead14a78653081d112c4557eb2762080a51b397318804e21e2bbe3893be8daee6f99319fb7b5814e9a034198d2bd76be07931e87359c7115bf7ec1337de4e07, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1238, Data length: 280, Offset + Data length: 1518} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:56 client -> Sending packet 4 (1280 bytes) for connection 4dd4e3331623435fd970, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 94f994e83a0c61a183706f589dc533f0eac3, SrcConnectionID: (empty), Token: 0xb7bbefc55ac2b5d9c804a2f09897a1a7f5c018834e38f5f2a1bc6ead14a78653081d112c4557eb2762080a51b397318804e21e2bbe3893be8daee6f99319fb7b5814e9a034198d2bd76be07931e87359c7115bf7ec1337de4e07, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:56 client -> Sending packet 5 (1280 bytes) for connection 4dd4e3331623435fd970, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 94f994e83a0c61a183706f589dc533f0eac3, SrcConnectionID: (empty), Token: 0xb7bbefc55ac2b5d9c804a2f09897a1a7f5c018834e38f5f2a1bc6ead14a78653081d112c4557eb2762080a51b397318804e21e2bbe3893be8daee6f99319fb7b5814e9a034198d2bd76be07931e87359c7115bf7ec1337de4e07, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1238, Data length: 280, Offset + Data length: 1518} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:56 client <- Reading packet 1946025800 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, Token: (empty), PacketNumber: 1946025800, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:56 client Received first packet. Switching destination connection ID to: 71bec968bd83bd722ef18c3c7a6c774c1059 2025/09/11 17:01:56 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/09/11 17:01:56 client newly acked packets (1): [5] 2025/09/11 17:01:56 client updated RTT: 33.343ms (σ: 12.615ms) 2025/09/11 17:01:56 client setting loss timer for packet 4 (Initial) to 38.05464ms (in 2025-09-11 17:01:56.584526097 +0000 UTC m=+14.488910178) 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 270 bytes. 2025/09/11 17:01:56 client <- Reading packet 1946025799 (779 bytes) for connection (empty), Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, PacketNumber: 1946025799, PacketNumberLen: 4, Length: 750, Version: v1} 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/11 17:01:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4dd4e3331623435fd970, InitialSourceConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, RetrySourceConnectionID: 94f994e83a0c61a183706f589dc533f0eac3, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xb3665b6f7377e7062ff88adeb2f42402, EnableResetStreamAt: false} 2025/09/11 17:01:56 client <- Reading packet 1946025799 (270 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1946025799, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4dd4e3331623435fd970 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, SrcConnectionID: (empty), Token: 0xb7bbefc55ac2b5d9c804a2f09897a1a7f5c018834e38f5f2a1bc6ead14a78653081d112c4557eb2762080a51b397318804e21e2bbe3893be8daee6f99319fb7b5814e9a034198d2bd76be07931e87359c7115bf7ec1337de4e07, PacketNumber: 6, PacketNumberLen: 2, Length: 1077, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 1946025800, LowestAcked: 1946025800, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:56 client Dropping Initial keys. 2025/09/11 17:01:56 client -> Sending packet 1 (60 bytes) for connection 4dd4e3331623435fd970, Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 1946025799, LowestAcked: 1946025799, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client -> Sending packet 0 (56 bytes) for connection 4dd4e3331623435fd970, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:56 client -> Sending packet 2 (84 bytes) for connection 4dd4e3331623435fd970, Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:56 client -> Sending packet 3 (84 bytes) for connection 4dd4e3331623435fd970, Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:56 client <- Reading packet 1946025800 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1946025800, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.PingFrame{} 2025/09/11 17:01:56 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:56 client -> Sending packet 1 (52 bytes) for connection 4dd4e3331623435fd970, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 1946025800, LowestAcked: 1946025799, DelayTime: 100.438µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client <- Reading packet 1946025801 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1946025801, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:56 client Dropping Handshake keys. 2025/09/11 17:01:56 client <- &wire.NewTokenFrame{Token: 0x3677f8621243720ea89f0dfe9cfab2a742201f9cc6643166ecb8e903fcac19611fe06892093a8ae03f} 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:56 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:56 client -> Sending packet 3 (71 bytes) for connection 4dd4e3331623435fd970, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 1946025801, LowestAcked: 1946025799, DelayTime: 94.877µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:56 client -> Sending packet 4 (56 bytes) for connection 4dd4e3331623435fd970, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 71bec968bd83bd722ef18c3c7a6c774c1059, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:56 client <- Reading packet 1946025802 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1946025802, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.PingFrame{} 2025/09/11 17:01:56 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:56 client <- Reading packet 1946025803 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1946025803, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 144µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client newly acked packets (1): [4] 2025/09/11 17:01:56 client updated RTT: 33.331ms (σ: 9.484ms) 2025/09/11 17:01:56 client ECN capability confirmed. 2025/09/11 17:01:56 client Canceling loss detection timer. 2025/09/11 17:01:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 04e9f2c294dfc0409f56b32831c1162ae87c, StatelessResetToken: 0xf20ed30c7cfa248ba2857259e5e3249b} 2025/09/11 17:01:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8adb93853c7c30be962f0a9f07adaea0eff3, StatelessResetToken: 0xc87d22c3c8d53a6b5b320a21682b3d1b} 2025/09/11 17:01:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 31400f692cf40040ecbee784d1244bc0afe6, StatelessResetToken: 0xa8adae365c73818716fc7daa8795db3d} 2025/09/11 17:01:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:56 client -> Sending packet 5 (54 bytes) for connection 4dd4e3331623435fd970, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 31400f692cf40040ecbee784d1244bc0afe6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 1946025803, LowestAcked: 1946025799, DelayTime: 118.372µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:56 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:56 client -> Sending packet 6 (40 bytes) for connection 4dd4e3331623435fd970, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: 31400f692cf40040ecbee784d1244bc0afe6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:56 client Connection 4dd4e3331623435fd970 closed. 2025/09/11 17:01:56 Requesting https://server4:443/odgzkvttwu. 2025/09/11 17:01:56 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:56 Increased send buffer size to 14336 kiB 2025/09/11 17:01:56 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:56 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:56 Created qlog file: /logs/qlog/c9eba1684ffc15bc7fb598c908d40d69e5a8a79e.sqlog 2025/09/11 17:01:56 client Starting new connection to server4 ([::]:39434 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, version v1 2025/09/11 17:01:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:56 client -> Sending packet 0 (1280 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/11 17:01:56 client -> Sending packet 1 (1280 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/09/11 17:01:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:56 client -> Sending packet 2 (1280 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/11 17:01:56 client -> Sending packet 3 (1280 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:56 client <- Reading packet 2048911152 (1200 bytes) for connection (empty), Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dac31a9a847b8146f7a24a7783c59b1834d7, Token: (empty), PacketNumber: 2048911152, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/09/11 17:01:56 client Received first packet. Switching destination connection ID to: dac31a9a847b8146f7a24a7783c59b1834d7 2025/09/11 17:01:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:56 client newly acked packets (1): [2] 2025/09/11 17:01:56 client updated RTT: 32.92912ms (σ: 16.46456ms) 2025/09/11 17:01:56 client <- &wire.PingFrame{} 2025/09/11 17:01:56 client -> Sending packet 4 (1280 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: dac31a9a847b8146f7a24a7783c59b1834d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 2048911152, LowestAcked: 2048911152, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:56 client <- Reading packet 2048911153 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dac31a9a847b8146f7a24a7783c59b1834d7, Token: (empty), PacketNumber: 2048911153, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:56 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:56 client newly acked packets (1): [3] 2025/09/11 17:01:56 client updated RTT: 33.15ms (σ: 12.79ms) 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 280 bytes. 2025/09/11 17:01:56 client <- Reading packet 2048911151 (769 bytes) for connection (empty), Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dac31a9a847b8146f7a24a7783c59b1834d7, PacketNumber: 2048911151, PacketNumberLen: 4, Length: 740, Version: v1} 2025/09/11 17:01:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/11 17:01:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, InitialSourceConnectionID: dac31a9a847b8146f7a24a7783c59b1834d7, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xb44ac2b15f80a203c2e07cd84c94f43f, EnableResetStreamAt: false} 2025/09/11 17:01:56 client <- Reading packet 2048911151 (280 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2048911151, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 02b364e1f25b22e64abae00437f495e0839f, StatelessResetToken: 0xb6a5582c37809fe736dcdb5d0428fc06} 2025/09/11 17:01:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f03f6b9389a43aecc429896cece1c74cd14, StatelessResetToken: 0xe14aaeee9e48b5d698b8684becbcb59e} 2025/09/11 17:01:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb9a1508227981782adaf5b12a06ccf70489, StatelessResetToken: 0x45a65a26352e447165d84e60ef4cd8c6} 2025/09/11 17:01:56 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e 2025/09/11 17:01:56 client Long Header{Type: Initial, DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 2048911153, LowestAcked: 2048911152, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:56 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:56 client Dropping Initial keys. 2025/09/11 17:01:56 client -> Sending packet 1 (116 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, Handshake 2025/09/11 17:01:56 client Long Header{Type: Handshake, DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 2048911151, LowestAcked: 2048911151, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:56 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:56 client -> Sending packet 2 (53 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:56 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:56 client -> &wire.AckFrame{LargestAcked: 2048911151, LowestAcked: 2048911151, DelayTime: 647.002µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client <- Reading packet 2048911153 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2048911153, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 94d874ec64f3c244fb880923159fb647f843, StatelessResetToken: 0xd28dbde58e6792d053987c3897f71f4f} 2025/09/11 17:01:57 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:57 client Dropping Handshake keys. 2025/09/11 17:01:57 client <- &wire.NewTokenFrame{Token: 0x3602123c6a2ccc5ccb743cc212516eac14f626c14b8a249ea1d8f5daa7db5843c0da6727eb726dc484} 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:57 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:57 client -> Sending packet 3 (54 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 2048911153, LowestAcked: 2048911151, AckRanges: {{Largest: 2048911153, Smallest: 2048911153}, {Largest: 2048911151, Smallest: 2048911151}}, DelayTime: 91.712µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client <- Reading packet 2048911154 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2048911154, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 4.504ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client newly acked packets (1): [0] 2025/09/11 17:01:57 client setting loss timer for packet 1 (1-RTT) to 39.037473ms (in 2025-09-11 17:01:57.007673145 +0000 UTC m=+14.912057247) 2025/09/11 17:01:57 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-11 17:01:57.007673145 +0000 UTC m=+14.912057247 2025/09/11 17:01:57 client lost packet 1 (time threshold) 2025/09/11 17:01:57 client Canceling loss detection timer. 2025/09/11 17:01:57 client -> Sending packet 4 (56 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:57 client <- Reading packet 2048911156 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2048911156, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.PingFrame{} 2025/09/11 17:01:57 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:57 client -> Sending packet 5 (56 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 2048911156, LowestAcked: 2048911151, AckRanges: {{Largest: 2048911156, Smallest: 2048911156}, {Largest: 2048911154, Smallest: 2048911153}, {Largest: 2048911151, Smallest: 2048911151}}, DelayTime: 75.281µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:57 client -> Sending packet 7 (56 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:57 client -> Sending packet 8 (56 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:57 client <- Reading packet 2048911157 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2048911157, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.PingFrame{} 2025/09/11 17:01:57 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:57 client <- Reading packet 2048911158 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2048911158, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:57 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:57 client -> Sending packet 9 (56 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 2048911158, LowestAcked: 2048911151, AckRanges: {{Largest: 2048911158, Smallest: 2048911156}, {Largest: 2048911154, Smallest: 2048911153}, {Largest: 2048911151, Smallest: 2048911151}}, DelayTime: 59.281µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:57 client -> Sending packet 10 (40 bytes) for connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: cb9a1508227981782adaf5b12a06ccf70489, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:57 client Connection c9eba1684ffc15bc7fb598c908d40d69e5a8a79e closed. 2025/09/11 17:01:57 Requesting https://server4:443/lzwbcleeta. 2025/09/11 17:01:57 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:57 Increased send buffer size to 14336 kiB 2025/09/11 17:01:57 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:57 Created qlog file: /logs/qlog/5715036af11e30976ea5d4.sqlog 2025/09/11 17:01:57 client Starting new connection to server4 ([::]:49098 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5715036af11e30976ea5d4, version v1 2025/09/11 17:01:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:57 client -> Sending packet 0 (1280 bytes) for connection 5715036af11e30976ea5d4, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 5715036af11e30976ea5d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:57 client -> Sending packet 1 (1280 bytes) for connection 5715036af11e30976ea5d4, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 5715036af11e30976ea5d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1237, Data length: 267, Offset + Data length: 1504} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client <- Reading packet 28281344 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e6db92d394d1f147a0e160e391abd326094, Token: (empty), PacketNumber: 28281344, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:57 client Received first packet. Switching destination connection ID to: 5e6db92d394d1f147a0e160e391abd326094 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:57 client newly acked packets (1): [0] 2025/09/11 17:01:57 client updated RTT: 32.023391ms (σ: 16.011695ms) 2025/09/11 17:01:57 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:57 client <- Reading packet 28281345 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e6db92d394d1f147a0e160e391abd326094, Token: (empty), PacketNumber: 28281345, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:57 client newly acked packets (1): [1] 2025/09/11 17:01:57 client updated RTT: 32.334ms (σ: 12.63ms) 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 292 bytes. 2025/09/11 17:01:57 client <- Reading packet 28281344 (759 bytes) for connection (empty), Handshake 2025/09/11 17:01:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e6db92d394d1f147a0e160e391abd326094, PacketNumber: 28281344, PacketNumberLen: 4, Length: 730, Version: v1} 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/11 17:01:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5715036af11e30976ea5d4, InitialSourceConnectionID: 5e6db92d394d1f147a0e160e391abd326094, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x1744012ed8896cc054a2ec5fe1bc7eed, EnableResetStreamAt: false} 2025/09/11 17:01:57 client <- Reading packet 28281344 (292 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 28281344, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e60c54a07e47c7000728e510bc688c077bec, StatelessResetToken: 0x88609c85927c24a291b02d1b4833f460} 2025/09/11 17:01:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 245e382b5dfff56d249919f19a870355ef0c, StatelessResetToken: 0x2b9f69c78cdea9c7f59583868d680a57} 2025/09/11 17:01:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, StatelessResetToken: 0xd37d956df13af3ae12b195ada83197a7} 2025/09/11 17:01:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5715036af11e30976ea5d4 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 28281345, LowestAcked: 28281344, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client Long Header{Type: Handshake, DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:57 client Short Header{DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:57 client Dropping Initial keys. 2025/09/11 17:01:57 client -> Sending packet 1 (56 bytes) for connection 5715036af11e30976ea5d4, Handshake 2025/09/11 17:01:57 client Long Header{Type: Handshake, DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 28281344, LowestAcked: 28281344, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client -> Sending packet 1 (49 bytes) for connection 5715036af11e30976ea5d4, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 28281344, LowestAcked: 28281344, DelayTime: 791.302µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client <- Reading packet 28281346 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 28281346, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe10f59bbcef4d2f45011bd2080213c17bfd, StatelessResetToken: 0x342ecc69098909a4d213d2aff0ea69c8} 2025/09/11 17:01:57 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:57 client Dropping Handshake keys. 2025/09/11 17:01:57 client <- &wire.NewTokenFrame{Token: 0x36fa6f986f183de04a1e43934db976aeef48a265d640942de309fc9d2d0ebfe4c8ba49331c7e8f1741} 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:57 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:57 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:57 client -> Sending packet 2 (50 bytes) for connection 5715036af11e30976ea5d4, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 28281346, LowestAcked: 28281344, AckRanges: {{Largest: 28281346, Smallest: 28281346}, {Largest: 28281344, Smallest: 28281344}}, DelayTime: 101.29µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client <- Reading packet 28281347 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 28281347, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:57 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:57 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:57 client -> Sending packet 3 (40 bytes) for connection 5715036af11e30976ea5d4, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 3a572727b7736676defdcb74bb0f64cca2d5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:57 client Connection 5715036af11e30976ea5d4 closed. 2025/09/11 17:01:57 Requesting https://server4:443/ucjyusqotk. 2025/09/11 17:01:57 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:57 Increased send buffer size to 14336 kiB 2025/09/11 17:01:57 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:57 Created qlog file: /logs/qlog/9b7cae386df4fc905c1c.sqlog 2025/09/11 17:01:57 client Starting new connection to server4 ([::]:36429 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9b7cae386df4fc905c1c, version v1 2025/09/11 17:01:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:57 client -> Sending packet 0 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 9b7cae386df4fc905c1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/11 17:01:57 client -> Sending packet 1 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 9b7cae386df4fc905c1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:57 client updated RTT: 33.402274ms (σ: 16.701137ms) 2025/09/11 17:01:57 client <- Received Retry: 2025/09/11 17:01:57 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 52ac5a70b78782f2a767bce1b124c3746798, Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, Version: v1} 2025/09/11 17:01:57 client Switching destination connection ID to: 52ac5a70b78782f2a767bce1b124c3746798 2025/09/11 17:01:57 client -> Sending packet 2 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 52ac5a70b78782f2a767bce1b124c3746798, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:57 client -> Sending packet 3 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 52ac5a70b78782f2a767bce1b124c3746798, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:57 client <- Reading packet 1858831781 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, Token: (empty), PacketNumber: 1858831781, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:57 client Received first packet. Switching destination connection ID to: 55555a840a88098d7b908c3fcca5d90510e6 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:57 client newly acked packets (1): [2] 2025/09/11 17:01:57 client updated RTT: 33.252ms (σ: 12.825ms) 2025/09/11 17:01:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:57 client -> Sending packet 4 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:57 client -> Sending packet 5 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:57 client -> Sending packet 6 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:57 client -> Sending packet 7 (1280 bytes) for connection 9b7cae386df4fc905c1c, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 7, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client Parsed a coalesced packet. Part 1: 153 bytes. Remaining: 1047 bytes. 2025/09/11 17:01:57 client <- Reading packet 1858831783 (153 bytes) for connection (empty), Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, Token: (empty), PacketNumber: 1858831783, PacketNumberLen: 4, Length: 123, Version: v1} 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Parsed a coalesced packet. Part 2: 779 bytes. Remaining: 268 bytes. 2025/09/11 17:01:57 client <- Reading packet 1858831782 (779 bytes) for connection (empty), Handshake 2025/09/11 17:01:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, PacketNumber: 1858831782, PacketNumberLen: 4, Length: 750, Version: v1} 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/11 17:01:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9b7cae386df4fc905c1c, InitialSourceConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, RetrySourceConnectionID: 52ac5a70b78782f2a767bce1b124c3746798, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x5d309f796974015953e9203d7a7ea0d9, EnableResetStreamAt: false} 2025/09/11 17:01:57 client <- Reading packet 1858831782 (268 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1858831782, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:57 client <- Reading packet 1858831784 (59 bytes) for connection (empty), Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, Token: (empty), PacketNumber: 1858831784, PacketNumberLen: 4, Length: 29, Version: v1} 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/11 17:01:57 client newly acked packets (1): [7] 2025/09/11 17:01:57 client updated RTT: 33.22ms (σ: 9.681ms) 2025/09/11 17:01:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9b7cae386df4fc905c1c 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), Token: 0xb7f2496c5a20535992a74ee9e92ae51588a2f91fea88779795a709bb54738d46a6a78f589202c131568ebe3a1b659740d6cb74c71d365398fac29a5ee9ba9d5d224e6d1cc9b0cb8484b5282057df41679efa2b0486fdbacf8dd7, PacketNumber: 8, PacketNumberLen: 2, Length: 1077, Version: v1} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 1858831784, LowestAcked: 1858831781, AckRanges: {{Largest: 1858831784, Smallest: 1858831783}, {Largest: 1858831781, Smallest: 1858831781}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client Long Header{Type: Handshake, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:57 client Dropping Initial keys. 2025/09/11 17:01:57 client -> Sending packet 1 (60 bytes) for connection 9b7cae386df4fc905c1c, Handshake 2025/09/11 17:01:57 client Long Header{Type: Handshake, DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 1858831782, LowestAcked: 1858831782, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client -> Sending packet 0 (56 bytes) for connection 9b7cae386df4fc905c1c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:57 client <- Reading packet 1858831783 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1858831783, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.PingFrame{} 2025/09/11 17:01:57 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:57 client -> Sending packet 1 (52 bytes) for connection 9b7cae386df4fc905c1c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 1858831783, LowestAcked: 1858831782, DelayTime: 83.496µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client <- Reading packet 1858831785 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1858831785, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/09/11 17:01:57 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:57 client -> Sending packet 2 (54 bytes) for connection 9b7cae386df4fc905c1c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 1858831785, LowestAcked: 1858831782, AckRanges: {{Largest: 1858831785, Smallest: 1858831785}, {Largest: 1858831783, Smallest: 1858831782}}, DelayTime: 59.562µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client <- Reading packet 1858831786 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1858831786, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.744ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client Peer doesn't await address validation any longer. 2025/09/11 17:01:57 client newly acked packets (1): [0] 2025/09/11 17:01:57 client updated RTT: 34.665ms (σ: 10.151ms) 2025/09/11 17:01:57 client ECN capability confirmed. 2025/09/11 17:01:57 client Canceling loss detection timer. 2025/09/11 17:01:57 client Dropping Handshake keys. 2025/09/11 17:01:57 client <- Reading packet 1858831789 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1858831789, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:57 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:57 client <- &wire.NewTokenFrame{Token: 0x36f000bf3ceda39201070c253fcac8b1bda3e9eac972f5ae5174502a77ad3be3d5dc0cfface735fd92} 2025/09/11 17:01:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:57 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/09/11 17:01:57 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:57 client -> Sending packet 3 (56 bytes) for connection 9b7cae386df4fc905c1c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.AckFrame{LargestAcked: 1858831789, LowestAcked: 1858831782, AckRanges: {{Largest: 1858831789, Smallest: 1858831789}, {Largest: 1858831786, Smallest: 1858831785}, {Largest: 1858831783, Smallest: 1858831782}}, DelayTime: 85.33µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:01:57 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:57 client -> Sending packet 4 (40 bytes) for connection 9b7cae386df4fc905c1c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:57 client Short Header{DestConnectionID: 55555a840a88098d7b908c3fcca5d90510e6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:57 client Connection 9b7cae386df4fc905c1c closed. 2025/09/11 17:01:57 Requesting https://server4:443/fftjikssdc. 2025/09/11 17:01:57 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:57 Increased send buffer size to 14336 kiB 2025/09/11 17:01:57 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:57 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:57 Created qlog file: /logs/qlog/e1890821e1d33d99e9ac1fa8804ce9a5.sqlog 2025/09/11 17:01:57 client Starting new connection to server4 ([::]:59526 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e1890821e1d33d99e9ac1fa8804ce9a5, version v1 2025/09/11 17:01:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:57 client -> Sending packet 0 (1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: e1890821e1d33d99e9ac1fa8804ce9a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:57 client -> Sending packet 1 (1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: e1890821e1d33d99e9ac1fa8804ce9a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:57 client -> Sending packet 2 (1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: e1890821e1d33d99e9ac1fa8804ce9a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:57 client -> Sending packet 3 (1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: e1890821e1d33d99e9ac1fa8804ce9a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:57 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:57 client <- Reading packet 447490706 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, Token: (empty), PacketNumber: 447490706, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:57 client Received first packet. Switching destination connection ID to: bbf090cbda99ae79cb6fed462f2ab84a65e2 2025/09/11 17:01:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:57 client newly acked packets (1): [2] 2025/09/11 17:01:57 client updated RTT: 32.345546ms (σ: 16.172773ms) 2025/09/11 17:01:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:58 client -> Sending packet 4 (1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:58 client -> Sending packet 5 (1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:58 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:58 client <- Reading packet 447490708 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, Token: (empty), PacketNumber: 447490708, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 286 bytes. 2025/09/11 17:01:58 client <- Reading packet 447490707 (765 bytes) for connection (empty), Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, PacketNumber: 447490707, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/11 17:01:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e1890821e1d33d99e9ac1fa8804ce9a5, InitialSourceConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x0c243e73ca2c15c96155cca539c0c940, EnableResetStreamAt: false} 2025/09/11 17:01:58 client <- Reading packet 447490707 (286 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490707, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- Reading packet 447490709 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, Token: (empty), PacketNumber: 447490709, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:58 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:58 client newly acked packets (1): [5] 2025/09/11 17:01:58 client updated RTT: 32.435ms (σ: 12.31ms) 2025/09/11 17:01:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490709, LowestAcked: 447490706, AckRanges: {{Largest: 447490709, Smallest: 447490708}, {Largest: 447490706, Smallest: 447490706}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client Dropping Initial keys. 2025/09/11 17:01:58 client -> Sending packet 1 (112 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490707, LowestAcked: 447490707, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client Short Header{DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:58 client -> Sending packet 2 (84 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client -> Sending packet 3 (84 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/11 17:01:58 client -> Sending packet 4 (84 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client -> Sending packet 5 (84 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client <- Reading packet 447490710 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490710, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.PingFrame{} 2025/09/11 17:01:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:58 client -> Sending packet 1 (50 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: bbf090cbda99ae79cb6fed462f2ab84a65e2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490710, LowestAcked: 447490707, AckRanges: {{Largest: 447490710, Smallest: 447490710}, {Largest: 447490707, Smallest: 447490707}}, DelayTime: 122.079µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client <- Reading packet 447490711 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490711, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f8b61475454e29b03dd9c7a72f4c64d4007, StatelessResetToken: 0xc5a1c9b2efc2b6109fd3c247ce11de98} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70641c32a8ad3268ca30680042781204eb3f, StatelessResetToken: 0xb29f8a40793059157babf3d977f809dd} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, StatelessResetToken: 0xe99f56f91714abc36989705ba16e0581} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client -> Sending packet 2 (52 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490711, LowestAcked: 447490707, AckRanges: {{Largest: 447490711, Smallest: 447490710}, {Largest: 447490707, Smallest: 447490707}}, DelayTime: 86.933µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:58 client <- Reading packet 447490712 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490712, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:58 client Dropping Handshake keys. 2025/09/11 17:01:58 client <- &wire.NewTokenFrame{Token: 0x36ea87db641374e3590e87f6975117843da600fd76516c1f0bbaa5c32a74f9a95d5fc3ea0981a7843f} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:58 client -> Sending packet 3 (51 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490712, LowestAcked: 447490707, AckRanges: {{Largest: 447490712, Smallest: 447490710}, {Largest: 447490707, Smallest: 447490707}}, DelayTime: 25.277177ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:58 client -> Sending packet 5 (56 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:58 client Skipping packet number 4 2025/09/11 17:01:58 client -> Sending packet 6 (39 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:58 client <- Reading packet 447490714 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490714, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.PingFrame{} 2025/09/11 17:01:58 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:58 client -> Sending packet 7 (52 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490714, LowestAcked: 447490707, AckRanges: {{Largest: 447490714, Smallest: 447490714}, {Largest: 447490712, Smallest: 447490710}, {Largest: 447490707, Smallest: 447490707}}, DelayTime: 73.247µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client <- Reading packet 447490715 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490715, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.PingFrame{} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client <- Reading packet 447490717 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490717, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.PingFrame{} 2025/09/11 17:01:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:58 client -> Sending packet 8 (54 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 447490717, LowestAcked: 447490707, AckRanges: {{Largest: 447490717, Smallest: 447490717}, {Largest: 447490715, Smallest: 447490714}, {Largest: 447490712, Smallest: 447490710}, {Largest: 447490707, Smallest: 447490707}}, DelayTime: 79.198µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client <- Reading packet 447490718 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 447490718, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 545dba6afbcd53292f67de92ae17d8e515b3, StatelessResetToken: 0x7def963a312efc9230137f0556c73cff} 2025/09/11 17:01:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client -> Sending packet 9 (1366 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.PingFrame{} 2025/09/11 17:01:58 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:58 client -> Sending packet 10 (40 bytes) for connection e1890821e1d33d99e9ac1fa8804ce9a5, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: f362a7d1f0645ad53b3bd3808ba3128755a1, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:58 client Connection e1890821e1d33d99e9ac1fa8804ce9a5 closed. 2025/09/11 17:01:58 Requesting https://server4:443/knhgozjwzf. 2025/09/11 17:01:58 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:58 Increased send buffer size to 14336 kiB 2025/09/11 17:01:58 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:58 Created qlog file: /logs/qlog/e0199e277b7163f0a7657e.sqlog 2025/09/11 17:01:58 client Starting new connection to server4 ([::]:37943 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e0199e277b7163f0a7657e, version v1 2025/09/11 17:01:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:58 client -> Sending packet 0 (1280 bytes) for connection e0199e277b7163f0a7657e, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: e0199e277b7163f0a7657e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:01:58 client -> Sending packet 1 (1280 bytes) for connection e0199e277b7163f0a7657e, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: e0199e277b7163f0a7657e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/09/11 17:01:58 client <- Reading packet 2137318086 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c0e43e3d3fe8f62e72310fa1df56c63a974b, Token: (empty), PacketNumber: 2137318086, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:58 client Received first packet. Switching destination connection ID to: c0e43e3d3fe8f62e72310fa1df56c63a974b 2025/09/11 17:01:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:58 client newly acked packets (1): [0] 2025/09/11 17:01:58 client updated RTT: 32.249898ms (σ: 16.124949ms) 2025/09/11 17:01:58 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:58 client <- Reading packet 2137318087 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c0e43e3d3fe8f62e72310fa1df56c63a974b, Token: (empty), PacketNumber: 2137318087, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:58 client newly acked packets (1): [1] 2025/09/11 17:01:58 client updated RTT: 32.557ms (σ: 12.71ms) 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Parsed a coalesced packet. Part 2: 760 bytes. Remaining: 291 bytes. 2025/09/11 17:01:58 client <- Reading packet 2137318086 (760 bytes) for connection (empty), Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c0e43e3d3fe8f62e72310fa1df56c63a974b, PacketNumber: 2137318086, PacketNumberLen: 4, Length: 731, Version: v1} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/09/11 17:01:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e0199e277b7163f0a7657e, InitialSourceConnectionID: c0e43e3d3fe8f62e72310fa1df56c63a974b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x3c9de31f5aa6672d9a10abc6f0d94b99, EnableResetStreamAt: false} 2025/09/11 17:01:58 client <- Reading packet 2137318086 (291 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2137318086, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d8f3bee50807a1582ba8edf3245252848405, StatelessResetToken: 0x5a2f4eaa6a4a1a85ebb036985d4a257f} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e44125293fb172becd6892a79f23791744c, StatelessResetToken: 0xd7809c28756bf8b2f672415f13e67105} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, StatelessResetToken: 0x0b2d22ef2290201f04844ae4a2c07c8d} 2025/09/11 17:01:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e0199e277b7163f0a7657e 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 2137318087, LowestAcked: 2137318086, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client Short Header{DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:58 client Dropping Initial keys. 2025/09/11 17:01:58 client -> Sending packet 1 (60 bytes) for connection e0199e277b7163f0a7657e, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 2137318086, LowestAcked: 2137318086, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client -> Sending packet 1 (53 bytes) for connection e0199e277b7163f0a7657e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 2137318086, LowestAcked: 2137318086, DelayTime: 779.791µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client <- Reading packet 2137318087 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2137318087, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.PingFrame{} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client <- Reading packet 2137318088 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2137318088, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 81a1b49d3e2255bacd688805495b530b90c5, StatelessResetToken: 0xd5053ea531c1611e805b4c1ff23d12b4} 2025/09/11 17:01:58 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:58 client Dropping Handshake keys. 2025/09/11 17:01:58 client <- &wire.NewTokenFrame{Token: 0x36aa4e99670fa900b2020fa6f1fff9529a91e7739c10de1cc07dd7485d3882182b718b42140c635d1f} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:58 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:58 client -> Sending packet 2 (52 bytes) for connection e0199e277b7163f0a7657e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 2137318088, LowestAcked: 2137318086, DelayTime: 136.416µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client <- Reading packet 2137318089 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2137318089, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:58 client -> Sending packet 3 (40 bytes) for connection e0199e277b7163f0a7657e, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 5675f6ce5b67bd5c89e5933fc699b21e161d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:58 Received 1 packets after sending CONNECTION_CLOSE. Retransmitting. 2025/09/11 17:01:58 client Connection e0199e277b7163f0a7657e closed. 2025/09/11 17:01:58 Requesting https://server4:443/szeitaxaqe. 2025/09/11 17:01:58 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:58 Increased send buffer size to 14336 kiB 2025/09/11 17:01:58 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:58 Created qlog file: /logs/qlog/3c6b0556970935340b04.sqlog 2025/09/11 17:01:58 client Starting new connection to server4 ([::]:38511 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3c6b0556970935340b04, version v1 2025/09/11 17:01:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:58 client -> Sending packet 0 (1280 bytes) for connection 3c6b0556970935340b04, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 3c6b0556970935340b04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/11 17:01:58 client -> Sending packet 1 (1280 bytes) for connection 3c6b0556970935340b04, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 3c6b0556970935340b04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:58 client <- Reading packet 721228489 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, Token: (empty), PacketNumber: 721228489, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:58 client Received first packet. Switching destination connection ID to: 4f02e204386ef5de123628d4eb9136b2d01c 2025/09/11 17:01:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:58 client newly acked packets (1): [0] 2025/09/11 17:01:58 client updated RTT: 32.089756ms (σ: 16.044878ms) 2025/09/11 17:01:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:58 client -> Sending packet 2 (1280 bytes) for connection 3c6b0556970935340b04, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:58 client -> Sending packet 3 (1280 bytes) for connection 3c6b0556970935340b04, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:58 client <- Reading packet 721228491 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, Token: (empty), PacketNumber: 721228491, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 292 bytes. 2025/09/11 17:01:58 client <- Reading packet 721228490 (759 bytes) for connection (empty), Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, PacketNumber: 721228490, PacketNumberLen: 4, Length: 730, Version: v1} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/11 17:01:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3c6b0556970935340b04, InitialSourceConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd917545b95f4383de29bab2cf9e3a414, EnableResetStreamAt: false} 2025/09/11 17:01:58 client <- Reading packet 721228490 (292 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 721228490, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3c6b0556970935340b04 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1168, Version: v1} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 721228491, LowestAcked: 721228489, AckRanges: {{Largest: 721228491, Smallest: 721228491}, {Largest: 721228489, Smallest: 721228489}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:58 client Dropping Initial keys. 2025/09/11 17:01:58 client -> Sending packet 1 (56 bytes) for connection 3c6b0556970935340b04, Handshake 2025/09/11 17:01:58 client Long Header{Type: Handshake, DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 721228490, LowestAcked: 721228490, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client -> Sending packet 0 (56 bytes) for connection 3c6b0556970935340b04, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:58 client <- Reading packet 721228491 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 721228491, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.PingFrame{} 2025/09/11 17:01:58 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:58 client -> Sending packet 1 (48 bytes) for connection 3c6b0556970935340b04, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 721228491, LowestAcked: 721228490, DelayTime: 75.141µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client <- Reading packet 721228492 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 721228492, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:58 client Dropping Handshake keys. 2025/09/11 17:01:58 client <- &wire.NewTokenFrame{Token: 0x36c90b6f2df50b5f0dbe8e6c88e4bef24b098ccdf241c5d6546c8b9fbad39bc072378648796e4c1bf2} 2025/09/11 17:01:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:58 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/09/11 17:01:58 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:58 client <- Reading packet 721228493 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:58 client Short Header{DestConnectionID: (empty), PacketNumber: 721228493, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/09/11 17:01:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:58 client -> Sending packet 2 (48 bytes) for connection 3c6b0556970935340b04, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.AckFrame{LargestAcked: 721228493, LowestAcked: 721228490, DelayTime: 64.04µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:58 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:58 client -> Sending packet 3 (40 bytes) for connection 3c6b0556970935340b04, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:58 client Short Header{DestConnectionID: 4f02e204386ef5de123628d4eb9136b2d01c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:58 client Connection 3c6b0556970935340b04 closed. 2025/09/11 17:01:58 Requesting https://server4:443/invogwfzss. 2025/09/11 17:01:58 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:58 Increased send buffer size to 14336 kiB 2025/09/11 17:01:58 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:58 Created qlog file: /logs/qlog/5d0298164e05c294d90be0ad57f1324c.sqlog 2025/09/11 17:01:58 client Starting new connection to server4 ([::]:49845 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5d0298164e05c294d90be0ad57f1324c, version v1 2025/09/11 17:01:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:58 client -> Sending packet 0 (1280 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 5d0298164e05c294d90be0ad57f1324c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:58 client -> Sending packet 1 (1280 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, Initial 2025/09/11 17:01:58 client Long Header{Type: Initial, DestConnectionID: 5d0298164e05c294d90be0ad57f1324c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:58 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:59 client -> Sending packet 2 (1280 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 5d0298164e05c294d90be0ad57f1324c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:59 client -> Sending packet 3 (1280 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 5d0298164e05c294d90be0ad57f1324c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1232, Data length: 287, Offset + Data length: 1519} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client <- Reading packet 1382740025 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e4f803940d6633cfe6dbcd543d6c7408a53b, Token: (empty), PacketNumber: 1382740025, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:59 client Received first packet. Switching destination connection ID to: e4f803940d6633cfe6dbcd543d6c7408a53b 2025/09/11 17:01:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:59 client newly acked packets (1): [2] 2025/09/11 17:01:59 client updated RTT: 32.339331ms (σ: 16.169665ms) 2025/09/11 17:01:59 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:01:59 client <- Reading packet 1382740026 (149 bytes) for connection (empty), Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e4f803940d6633cfe6dbcd543d6c7408a53b, Token: (empty), PacketNumber: 1382740026, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:01:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:01:59 client newly acked packets (1): [3] 2025/09/11 17:01:59 client updated RTT: 32.63ms (σ: 12.709ms) 2025/09/11 17:01:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 287 bytes. 2025/09/11 17:01:59 client <- Reading packet 1382740025 (764 bytes) for connection (empty), Handshake 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e4f803940d6633cfe6dbcd543d6c7408a53b, PacketNumber: 1382740025, PacketNumberLen: 4, Length: 735, Version: v1} 2025/09/11 17:01:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/11 17:01:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5d0298164e05c294d90be0ad57f1324c, InitialSourceConnectionID: e4f803940d6633cfe6dbcd543d6c7408a53b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x7c146f0aa10b1f67669787227ce25815, EnableResetStreamAt: false} 2025/09/11 17:01:59 client <- Reading packet 1382740025 (287 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1382740025, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3821eaff166988d9da4187e1dda3bee329ef, StatelessResetToken: 0x4181b8744fd657edd1274ddca981ef05} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b544661eaec82a700d369b6baddbfa9db73e, StatelessResetToken: 0x505205c9ac42b7195c3a0d216599ecde} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, StatelessResetToken: 0x5b0cfdd7cbe7b8474cf74d0db3601a61} 2025/09/11 17:01:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5d0298164e05c294d90be0ad57f1324c 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 1382740026, LowestAcked: 1382740025, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:59 client Short Header{DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:59 client Dropping Initial keys. 2025/09/11 17:01:59 client -> Sending packet 1 (60 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, Handshake 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 1382740025, LowestAcked: 1382740025, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client -> Sending packet 1 (53 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 1382740025, LowestAcked: 1382740025, DelayTime: 712.955µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client <- Reading packet 1382740026 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1382740026, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.PingFrame{} 2025/09/11 17:01:59 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:59 client <- Reading packet 1382740027 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1382740027, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4f9280e5112178c02138f8630ce4fe1b3091, StatelessResetToken: 0xbfe579c72a085339f7f3b47e5cf16ca0} 2025/09/11 17:01:59 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:59 client Dropping Handshake keys. 2025/09/11 17:01:59 client <- &wire.NewTokenFrame{Token: 0x365c856e5241ae2e0017cbc752a0551c97f4d34cfe7ef401cfe259d395aaec47ab50a3570dabeaa916} 2025/09/11 17:01:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:01:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:01:59 client -> Sending packet 2 (52 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 1382740027, LowestAcked: 1382740025, DelayTime: 115.416µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client <- Reading packet 1382740028 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1382740028, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:01:59 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:59 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:59 client -> Sending packet 3 (40 bytes) for connection 5d0298164e05c294d90be0ad57f1324c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 5dcbd36c3f1ed08bc170f6467f1f3e7af751, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:59 client Connection 5d0298164e05c294d90be0ad57f1324c closed. 2025/09/11 17:01:59 Requesting https://server4:443/ekoznqaggv. 2025/09/11 17:01:59 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:59 Increased send buffer size to 14336 kiB 2025/09/11 17:01:59 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:59 Created qlog file: /logs/qlog/88368dfc497f6cc2778dd3.sqlog 2025/09/11 17:01:59 client Starting new connection to server4 ([::]:51419 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 88368dfc497f6cc2778dd3, version v1 2025/09/11 17:01:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:59 client -> Sending packet 0 (1280 bytes) for connection 88368dfc497f6cc2778dd3, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 88368dfc497f6cc2778dd3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:01:59 client -> Sending packet 1 (1280 bytes) for connection 88368dfc497f6cc2778dd3, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 88368dfc497f6cc2778dd3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:59 client <- Reading packet 682154421 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, Token: (empty), PacketNumber: 682154421, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:59 client Received first packet. Switching destination connection ID to: 011d431465b1bf6adef1c5a84b248b1a5292 2025/09/11 17:01:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:01:59 client newly acked packets (1): [0] 2025/09/11 17:01:59 client updated RTT: 32.088354ms (σ: 16.044177ms) 2025/09/11 17:01:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:59 client -> Sending packet 2 (1280 bytes) for connection 88368dfc497f6cc2778dd3, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/11 17:01:59 client -> Sending packet 3 (1280 bytes) for connection 88368dfc497f6cc2778dd3, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/11 17:01:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:59 client -> Sending packet 4 (1280 bytes) for connection 88368dfc497f6cc2778dd3, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client -> Sending packet 5 (1280 bytes) for connection 88368dfc497f6cc2778dd3, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:01:59 client <- Reading packet 682154422 (151 bytes) for connection (empty), Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, Token: (empty), PacketNumber: 682154422, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:01:59 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/11 17:01:59 client newly acked packets (1): [5] 2025/09/11 17:01:59 client updated RTT: 32.338ms (σ: 12.533ms) 2025/09/11 17:01:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:01:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 288 bytes. 2025/09/11 17:01:59 client <- Reading packet 682154421 (761 bytes) for connection (empty), Handshake 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, PacketNumber: 682154421, PacketNumberLen: 4, Length: 732, Version: v1} 2025/09/11 17:01:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/11 17:01:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:01:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 88368dfc497f6cc2778dd3, InitialSourceConnectionID: 011d431465b1bf6adef1c5a84b248b1a5292, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x4fcc291a3bd3df7d5631fc7dced7ef9e, EnableResetStreamAt: false} 2025/09/11 17:01:59 client <- Reading packet 682154421 (288 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 682154421, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1f741e6db932bbbefbf2743293e2fb83b779, StatelessResetToken: 0x56a537df6dca1b395ad62242cb984752} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08aec80a76257957dd48a6ce11f717d58e3e, StatelessResetToken: 0xdc1171f03d491fc5494ca7612d346fde} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, StatelessResetToken: 0x8126a3a8de3c85470bab0e8fc4f074a3} 2025/09/11 17:01:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:01:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 88368dfc497f6cc2778dd3 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 682154422, LowestAcked: 682154421, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:59 client Dropping Initial keys. 2025/09/11 17:01:59 client -> Sending packet 1 (112 bytes) for connection 88368dfc497f6cc2778dd3, Handshake 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 682154421, LowestAcked: 682154421, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:59 client -> Sending packet 2 (49 bytes) for connection 88368dfc497f6cc2778dd3, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 682154421, LowestAcked: 682154421, DelayTime: 664.104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client <- Reading packet 682154422 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 682154422, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.PingFrame{} 2025/09/11 17:01:59 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:59 client Sending ACK because the ACK timer expired. 2025/09/11 17:01:59 client -> Sending packet 3 (49 bytes) for connection 88368dfc497f6cc2778dd3, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 682154422, LowestAcked: 682154421, DelayTime: 25.267578ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:01:59 client -> Sending packet 2 (84 bytes) for connection 88368dfc497f6cc2778dd3, Handshake 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:59 client -> Sending packet 3 (84 bytes) for connection 88368dfc497f6cc2778dd3, Handshake 2025/09/11 17:01:59 client Long Header{Type: Handshake, DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:01:59 client <- Reading packet 682154425 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 682154425, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.PingFrame{} 2025/09/11 17:01:59 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:01:59 client -> Sending packet 4 (50 bytes) for connection 88368dfc497f6cc2778dd3, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 682154425, LowestAcked: 682154421, AckRanges: {{Largest: 682154425, Smallest: 682154425}, {Largest: 682154422, Smallest: 682154421}}, DelayTime: 76.283µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client <- Reading packet 682154426 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 682154426, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8a93badcb5678ec86c886c09a1a54df5432f, StatelessResetToken: 0x4cd9d20ed1141cde9f8fbec71cd31e7d} 2025/09/11 17:01:59 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:01:59 client Dropping Handshake keys. 2025/09/11 17:01:59 client <- &wire.NewTokenFrame{Token: 0x364a4d8ef1bf1c420fd9da0428aa1804934403d49962093978e7544e4339de798edc94f679c82bb359} 2025/09/11 17:01:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:01:59 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:01:59 client -> Sending packet 6 (52 bytes) for connection 88368dfc497f6cc2778dd3, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.AckFrame{LargestAcked: 682154426, LowestAcked: 682154421, AckRanges: {{Largest: 682154426, Smallest: 682154425}, {Largest: 682154422, Smallest: 682154421}}, DelayTime: 97.893µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:01:59 client Skipping packet number 5 2025/09/11 17:01:59 client -> Sending packet 7 (56 bytes) for connection 88368dfc497f6cc2778dd3, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:01:59 client <- Reading packet 682154427 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:01:59 client Short Header{DestConnectionID: (empty), PacketNumber: 682154427, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:01:59 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:01:59 client newly acked packets (2): [6 7] 2025/09/11 17:01:59 client updated RTT: 32.318ms (σ: 9.439ms) 2025/09/11 17:01:59 client ECN capability confirmed. 2025/09/11 17:01:59 client Canceling loss detection timer. 2025/09/11 17:01:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:01:59 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:01:59 client Ignoring all packets below 682154427. 2025/09/11 17:01:59 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:01:59 client -> Sending packet 8 (40 bytes) for connection 88368dfc497f6cc2778dd3, 1-RTT (ECN: ECT(0)) 2025/09/11 17:01:59 client Short Header{DestConnectionID: 66f5776bcac031e3b77c737641562aa37fe7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:01:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:01:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:01:59 client Connection 88368dfc497f6cc2778dd3 closed. 2025/09/11 17:01:59 Requesting https://server4:443/bklplxmnry. 2025/09/11 17:01:59 Increased receive buffer size to 14336 kiB 2025/09/11 17:01:59 Increased send buffer size to 14336 kiB 2025/09/11 17:01:59 Setting DF for IPv4 and IPv6. 2025/09/11 17:01:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:01:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:01:59 Created qlog file: /logs/qlog/f5a3ad8077555bf0fdf11234d515f174a3974b.sqlog 2025/09/11 17:01:59 client Starting new connection to server4 ([::]:41872 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f5a3ad8077555bf0fdf11234d515f174a3974b, version v1 2025/09/11 17:01:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:01:59 client -> Sending packet 0 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: f5a3ad8077555bf0fdf11234d515f174a3974b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:59 client -> Sending packet 1 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: f5a3ad8077555bf0fdf11234d515f174a3974b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client updated RTT: 33.252776ms (σ: 16.626388ms) 2025/09/11 17:01:59 client <- Received Retry: 2025/09/11 17:01:59 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: cdf289df0d0675b7ffe8920a77a4b25a1b21, Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, Version: v1} 2025/09/11 17:01:59 client Switching destination connection ID to: cdf289df0d0675b7ffe8920a77a4b25a1b21 2025/09/11 17:01:59 client -> Sending packet 2 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: cdf289df0d0675b7ffe8920a77a4b25a1b21, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:01:59 client -> Sending packet 3 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: cdf289df0d0675b7ffe8920a77a4b25a1b21, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 1205, Data length: 24, Offset + Data length: 1229} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:01:59 client <- Reading packet 1410329054 (55 bytes) for connection (empty), Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75745c062b439c16eb055d230789dbdbbe96, Token: (empty), PacketNumber: 1410329054, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:01:59 client Received first packet. Switching destination connection ID to: 75745c062b439c16eb055d230789dbdbbe96 2025/09/11 17:01:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/11 17:01:59 client newly acked packets (1): [3] 2025/09/11 17:01:59 client updated RTT: 33.242ms (σ: 12.488ms) 2025/09/11 17:01:59 client setting loss timer for packet 2 (Initial) to 37.39725ms (in 2025-09-11 17:01:59.737900286 +0000 UTC m=+17.642284367) 2025/09/11 17:01:59 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-11 17:01:59.737900286 +0000 UTC m=+17.642284367 2025/09/11 17:01:59 client lost packet 2 (time threshold) 2025/09/11 17:01:59 client -> Sending packet 4 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:01:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:01:59 client -> Sending packet 5 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:01:59 client -> Sending packet 6 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:01:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:01:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:01:59 client -> Sending packet 7 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 7, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:01:59 client -> Sending packet 8 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:01:59 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 8, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:01:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:02:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/11 17:02:00 client -> Sending packet 9 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:02:00 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 9, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:02:00 client -> Sending packet 10 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:02:00 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 10, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:02:00 client <- Reading packet 1410329057 (59 bytes) for connection (empty), Initial 2025/09/11 17:02:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75745c062b439c16eb055d230789dbdbbe96, Token: (empty), PacketNumber: 1410329057, PacketNumberLen: 4, Length: 29, Version: v1} 2025/09/11 17:02:00 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/09/11 17:02:00 client newly acked packets (1): [10] 2025/09/11 17:02:00 client updated RTT: 33.2ms (σ: 9.448ms) 2025/09/11 17:02:00 client -> Sending packet 11 (1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Initial 2025/09/11 17:02:00 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 11, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:00 client -> &wire.PingFrame{} 2025/09/11 17:02:01 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/09/11 17:02:01 client <- Reading packet 1410329060 (144 bytes) for connection (empty), Initial 2025/09/11 17:02:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75745c062b439c16eb055d230789dbdbbe96, Token: (empty), PacketNumber: 1410329060, PacketNumberLen: 4, Length: 114, Version: v1} 2025/09/11 17:02:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:01 client Parsed a coalesced packet. Part 2: 787 bytes. Remaining: 269 bytes. 2025/09/11 17:02:01 client <- Reading packet 1410329057 (787 bytes) for connection (empty), Handshake 2025/09/11 17:02:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 75745c062b439c16eb055d230789dbdbbe96, PacketNumber: 1410329057, PacketNumberLen: 4, Length: 758, Version: v1} 2025/09/11 17:02:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/11 17:02:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f5a3ad8077555bf0fdf11234d515f174a3974b, InitialSourceConnectionID: 75745c062b439c16eb055d230789dbdbbe96, RetrySourceConnectionID: cdf289df0d0675b7ffe8920a77a4b25a1b21, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x7fc0968a295bbcb6c024222d30bf80f3, EnableResetStreamAt: false} 2025/09/11 17:02:01 client <- Reading packet 1410329057 (269 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329057, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b 2025/09/11 17:02:01 client Long Header{Type: Initial, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), Token: 0xb7f7757fb3468d1d7c01dcd89bc21d7eede03349f603a639eb16a2868f304e2d499547febda48e6a927edc0cf1c4340d4fedd6fd8180cfb4ada1b041eac0192a9622504a54417330e741ad75804a46e4fcb38423d877a63adb14, PacketNumber: 12, PacketNumberLen: 2, Length: 1021, Version: v1} 2025/09/11 17:02:01 client -> &wire.AckFrame{LargestAcked: 1410329060, LowestAcked: 1410329054, AckRanges: {{Largest: 1410329060, Smallest: 1410329060}, {Largest: 1410329057, Smallest: 1410329057}, {Largest: 1410329054, Smallest: 1410329054}}, DelayTime: 0s} 2025/09/11 17:02:01 client Long Header{Type: Handshake, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:01 client Short Header{DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:01 client Dropping Initial keys. 2025/09/11 17:02:01 client -> Sending packet 1 (57 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Handshake 2025/09/11 17:02:01 client Long Header{Type: Handshake, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/11 17:02:01 client -> &wire.AckFrame{LargestAcked: 1410329057, LowestAcked: 1410329057, DelayTime: 0s} 2025/09/11 17:02:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:02:02 client -> Sending packet 2 (84 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Handshake 2025/09/11 17:02:02 client Long Header{Type: Handshake, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:02 client -> Sending packet 3 (84 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, Handshake 2025/09/11 17:02:02 client Long Header{Type: Handshake, DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:02 client <- Reading packet 1410329058 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329058, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.PingFrame{} 2025/09/11 17:02:02 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:02 client -> Sending packet 1 (49 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:02 client Short Header{DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:02 client -> &wire.AckFrame{LargestAcked: 1410329058, LowestAcked: 1410329057, DelayTime: 87.274µs} 2025/09/11 17:02:02 client <- Reading packet 1410329059 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329059, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:02 client Dropping Handshake keys. 2025/09/11 17:02:02 client <- &wire.NewTokenFrame{Token: 0x36ae79f3aadb2174d840bc7b94b1e78d4aba5e33691e9798c90ec7ab4f6f0e8a60d999eda315ffa3ec} 2025/09/11 17:02:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:02 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:02:02 client -> Sending packet 3 (68 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:02 client Short Header{DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:02 client -> &wire.AckFrame{LargestAcked: 1410329059, LowestAcked: 1410329057, DelayTime: 80.962µs} 2025/09/11 17:02:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:02 client -> Sending packet 4 (56 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:02 client Short Header{DestConnectionID: 75745c062b439c16eb055d230789dbdbbe96, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:02 client <- Reading packet 1410329060 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329060, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac526dae6cb86931c4d956276c2c80c6ad96, StatelessResetToken: 0x243ec4cccf3ed287915e87a84a30f2f2} 2025/09/11 17:02:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b7425e0bdec828e73e4137defd5f76c951a9, StatelessResetToken: 0xaa60470dc075d8cd12aed84465a640e7} 2025/09/11 17:02:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d561134174916a41001196bd45ef9fc27a7, StatelessResetToken: 0xdb55f07c2a4886ca709dbec0025bb6e7} 2025/09/11 17:02:02 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:02 client -> Sending packet 5 (51 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:02 client Short Header{DestConnectionID: 9d561134174916a41001196bd45ef9fc27a7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:02 client -> &wire.AckFrame{LargestAcked: 1410329060, LowestAcked: 1410329057, DelayTime: 89.618µs} 2025/09/11 17:02:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:02 client <- Reading packet 1410329061 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329061, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.PingFrame{} 2025/09/11 17:02:02 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:02 client <- Reading packet 1410329063 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329063, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 768162c709c8f6ae9be713b8a937beb97d62, StatelessResetToken: 0x441cbd3a825c028b33e451eb6ac0b793} 2025/09/11 17:02:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:02 client -> Sending packet 6 (51 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:02 client Short Header{DestConnectionID: 9d561134174916a41001196bd45ef9fc27a7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:02 client -> &wire.AckFrame{LargestAcked: 1410329063, LowestAcked: 1410329057, AckRanges: {{Largest: 1410329063, Smallest: 1410329063}, {Largest: 1410329061, Smallest: 1410329057}}, DelayTime: 91.554µs} 2025/09/11 17:02:02 client <- Reading packet 1410329064 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329064, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 4.288ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:02:02 client newly acked packets (2): [4 5] 2025/09/11 17:02:02 client updated RTT: 33.417ms (σ: 7.52ms) 2025/09/11 17:02:02 client ECN capability confirmed. 2025/09/11 17:02:02 client Canceling loss detection timer. 2025/09/11 17:02:02 client Ignoring all packets below 1410329061. 2025/09/11 17:02:02 client <- Reading packet 1410329065 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1410329065, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:02:02 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:02 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:02 client -> Sending packet 7 (40 bytes) for connection f5a3ad8077555bf0fdf11234d515f174a3974b, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:02 client Short Header{DestConnectionID: 9d561134174916a41001196bd45ef9fc27a7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:02 client Connection f5a3ad8077555bf0fdf11234d515f174a3974b closed. 2025/09/11 17:02:02 Requesting https://server4:443/sjpjpoyife. 2025/09/11 17:02:02 Increased receive buffer size to 14336 kiB 2025/09/11 17:02:02 Increased send buffer size to 14336 kiB 2025/09/11 17:02:02 Setting DF for IPv4 and IPv6. 2025/09/11 17:02:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:02:02 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:02:02 Created qlog file: /logs/qlog/3054eccb276d1037.sqlog 2025/09/11 17:02:02 client Starting new connection to server4 ([::]:38615 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3054eccb276d1037, version v1 2025/09/11 17:02:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:02:02 client -> Sending packet 0 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: 3054eccb276d1037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:02:02 client -> Sending packet 1 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: 3054eccb276d1037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:02:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:02:02 client -> Sending packet 2 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: 3054eccb276d1037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:02:02 client -> Sending packet 3 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: 3054eccb276d1037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:02:02 client -> Sending packet 4 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: 3054eccb276d1037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:02:02 client -> Sending packet 5 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: 3054eccb276d1037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:02 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:02 client <- Reading packet 319646599 (55 bytes) for connection (empty), Initial 2025/09/11 17:02:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, Token: (empty), PacketNumber: 319646599, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:02:02 client Received first packet. Switching destination connection ID to: a59d586a07da49bb3ee7acbae8101fe6a94a 2025/09/11 17:02:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/11 17:02:02 client newly acked packets (1): [4] 2025/09/11 17:02:02 client updated RTT: 32.49846ms (σ: 16.24923ms) 2025/09/11 17:02:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/11 17:02:03 client -> Sending packet 6 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:03 client Long Header{Type: Initial, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:03 client -> Sending packet 7 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:03 client Long Header{Type: Initial, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/11 17:02:03 client -> Sending packet 8 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:03 client Long Header{Type: Initial, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:03 client -> Sending packet 9 (1280 bytes) for connection 3054eccb276d1037, Initial 2025/09/11 17:02:03 client Long Header{Type: Initial, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/11 17:02:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:03 client <- Reading packet 319646603 (57 bytes) for connection (empty), Initial 2025/09/11 17:02:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, Token: (empty), PacketNumber: 319646603, PacketNumberLen: 4, Length: 27, Version: v1} 2025/09/11 17:02:03 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/09/11 17:02:03 client newly acked packets (1): [9] 2025/09/11 17:02:03 client updated RTT: 32.56ms (σ: 12.312ms) 2025/09/11 17:02:04 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/09/11 17:02:04 client <- Reading packet 319646604 (144 bytes) for connection (empty), Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, Token: (empty), PacketNumber: 319646604, PacketNumberLen: 4, Length: 114, Version: v1} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 300 bytes. 2025/09/11 17:02:04 client <- Reading packet 319646601 (756 bytes) for connection (empty), Handshake 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, PacketNumber: 319646601, PacketNumberLen: 4, Length: 727, Version: v1} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/11 17:02:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3054eccb276d1037, InitialSourceConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xae6f8bb13394e44c0f7491f27cb62edd, EnableResetStreamAt: false} 2025/09/11 17:02:04 client <- Reading packet 319646601 (300 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646601, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.PingFrame{} 2025/09/11 17:02:04 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3054eccb276d1037 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1112, Version: v1} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646604, LowestAcked: 319646599, AckRanges: {{Largest: 319646604, Smallest: 319646603}, {Largest: 319646599, Smallest: 319646599}}, DelayTime: 0s} 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:04 client Short Header{DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:04 client Dropping Initial keys. 2025/09/11 17:02:04 client -> Sending packet 1 (53 bytes) for connection 3054eccb276d1037, Handshake 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646601, LowestAcked: 319646601, DelayTime: 0s} 2025/09/11 17:02:04 client -> Sending packet 1 (46 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: a59d586a07da49bb3ee7acbae8101fe6a94a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646601, LowestAcked: 319646601, DelayTime: 813.754µs} 2025/09/11 17:02:04 client <- Reading packet 319646603 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646603, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8d7810cfac2ce8d538c1067331fb3c9583a7, StatelessResetToken: 0xa2791db3d02ec65ef8fe049486ab2772} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dae7fad538248bc5e7ced71af523e987dee6, StatelessResetToken: 0x5e9b45bfca643012f559a511760bfaae} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, StatelessResetToken: 0x408e6eac9148661eea7c3b640ce344e0} 2025/09/11 17:02:04 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:04 client Dropping Handshake keys. 2025/09/11 17:02:04 client <- &wire.NewTokenFrame{Token: 0x367540f75d1225095a25cf7b428e62d05bd68e5be0b6ff3ff55886c4191a846de20fbfd07737f2fe01} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:04 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 779, Offset + Data length: 779} 2025/09/11 17:02:04 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:04 client -> Sending packet 2 (49 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646603, LowestAcked: 319646601, AckRanges: {{Largest: 319646603, Smallest: 319646603}, {Largest: 319646601, Smallest: 319646601}}, DelayTime: 115.327µs} 2025/09/11 17:02:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:04 client <- Reading packet 319646605 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646605, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.568ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client newly acked packets (1): [0] 2025/09/11 17:02:04 client <- Reading packet 319646606 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646606, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e449a87ccadfc23e0919e94af5c880fe41a5, StatelessResetToken: 0xdb86cd2e6ea43a60ccd71b96a71e52fd} 2025/09/11 17:02:04 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:04 client -> Sending packet 3 (49 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646606, LowestAcked: 319646601, AckRanges: {{Largest: 319646606, Smallest: 319646605}, {Largest: 319646603, Smallest: 319646603}, {Largest: 319646601, Smallest: 319646601}}, DelayTime: 75.14µs} 2025/09/11 17:02:04 client <- Reading packet 319646607 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646607, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 4.28ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client newly acked packets (1): [2] 2025/09/11 17:02:04 client updated RTT: 32.855ms (σ: 9.825ms) 2025/09/11 17:02:04 client ECN capability confirmed. 2025/09/11 17:02:04 client Canceling loss detection timer. 2025/09/11 17:02:04 client Ignoring all packets below 319646604. 2025/09/11 17:02:04 client <- Reading packet 319646609 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646609, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.PingFrame{} 2025/09/11 17:02:04 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:04 client -> Sending packet 4 (47 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646609, LowestAcked: 319646605, AckRanges: {{Largest: 319646609, Smallest: 319646609}, {Largest: 319646607, Smallest: 319646605}}, DelayTime: 89.638µs} 2025/09/11 17:02:04 client <- Reading packet 319646610 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646610, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.PingFrame{} 2025/09/11 17:02:04 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:04 client -> Sending packet 5 (1366 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.PingFrame{} 2025/09/11 17:02:04 client Sending ACK because the ACK timer expired. 2025/09/11 17:02:04 client -> Sending packet 6 (48 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646610, LowestAcked: 319646605, AckRanges: {{Largest: 319646610, Smallest: 319646609}, {Largest: 319646607, Smallest: 319646605}}, DelayTime: 25.357516ms} 2025/09/11 17:02:04 client <- Reading packet 319646613 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 319646613, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 779, Data length: 245, Offset + Data length: 1024} 2025/09/11 17:02:04 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:04 client -> Sending packet 7 (49 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 319646613, LowestAcked: 319646605, AckRanges: {{Largest: 319646613, Smallest: 319646613}, {Largest: 319646610, Smallest: 319646609}, {Largest: 319646607, Smallest: 319646605}}, DelayTime: 77.935µs} 2025/09/11 17:02:04 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:04 client -> Sending packet 8 (40 bytes) for connection 3054eccb276d1037, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 6ce4b47142e5d36f8527e27f7abef485fefb, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:04 client Connection 3054eccb276d1037 closed. 2025/09/11 17:02:04 Requesting https://server4:443/yvgrdzfvyq. 2025/09/11 17:02:04 Increased receive buffer size to 14336 kiB 2025/09/11 17:02:04 Increased send buffer size to 14336 kiB 2025/09/11 17:02:04 Setting DF for IPv4 and IPv6. 2025/09/11 17:02:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:02:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:02:04 Created qlog file: /logs/qlog/2a85b128ee44ac1a.sqlog 2025/09/11 17:02:04 client Starting new connection to server4 ([::]:41045 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2a85b128ee44ac1a, version v1 2025/09/11 17:02:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:02:04 client -> Sending packet 0 (1280 bytes) for connection 2a85b128ee44ac1a, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 2a85b128ee44ac1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client -> Sending packet 1 (1280 bytes) for connection 2a85b128ee44ac1a, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 2a85b128ee44ac1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1240, Data length: 274, Offset + Data length: 1514} 2025/09/11 17:02:04 client <- Reading packet 1638997093 (55 bytes) for connection (empty), Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0642a8ded9219bd041bb30584283479b592, Token: (empty), PacketNumber: 1638997093, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:02:04 client Received first packet. Switching destination connection ID to: f0642a8ded9219bd041bb30584283479b592 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:02:04 client newly acked packets (1): [0] 2025/09/11 17:02:04 client updated RTT: 32.055309ms (σ: 16.027654ms) 2025/09/11 17:02:04 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:02:04 client <- Reading packet 1638997094 (149 bytes) for connection (empty), Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0642a8ded9219bd041bb30584283479b592, Token: (empty), PacketNumber: 1638997094, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:02:04 client newly acked packets (1): [1] 2025/09/11 17:02:04 client updated RTT: 32.372ms (σ: 12.654ms) 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 294 bytes. 2025/09/11 17:02:04 client <- Reading packet 1638997093 (757 bytes) for connection (empty), Handshake 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0642a8ded9219bd041bb30584283479b592, PacketNumber: 1638997093, PacketNumberLen: 4, Length: 728, Version: v1} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/11 17:02:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2a85b128ee44ac1a, InitialSourceConnectionID: f0642a8ded9219bd041bb30584283479b592, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x1b1dbf100969a3f0b0bdcbb26c525064, EnableResetStreamAt: false} 2025/09/11 17:02:04 client <- Reading packet 1638997093 (294 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1638997093, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e35581eaf650833b5c0405f57a4648cc4c7a, StatelessResetToken: 0x99a379c6d6c08622dad7ab68a1b71305} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 07956b791b45c22d1fd8761be4557ebb0b51, StatelessResetToken: 0x9c289bb4ac58e419192121d79a813fbd} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, StatelessResetToken: 0x4d4e53a7022a5785eb2683dd4f64c87b} 2025/09/11 17:02:04 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2a85b128ee44ac1a 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 1638997094, LowestAcked: 1638997093, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:04 client Short Header{DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:04 client Dropping Initial keys. 2025/09/11 17:02:04 client -> Sending packet 1 (60 bytes) for connection 2a85b128ee44ac1a, Handshake 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 1638997093, LowestAcked: 1638997093, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client -> Sending packet 1 (53 bytes) for connection 2a85b128ee44ac1a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 1638997093, LowestAcked: 1638997093, DelayTime: 673.098µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client <- Reading packet 1638997094 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1638997094, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.PingFrame{} 2025/09/11 17:02:04 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:04 client <- Reading packet 1638997097 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1638997097, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.96ms} 2025/09/11 17:02:04 client Peer doesn't await address validation any longer. 2025/09/11 17:02:04 client newly acked packets (1): [0] 2025/09/11 17:02:04 client updated RTT: 32.915ms (σ: 10.576ms) 2025/09/11 17:02:04 client Canceling loss detection timer. 2025/09/11 17:02:04 client Dropping Handshake keys. 2025/09/11 17:02:04 client Sending ACK because the ACK timer expired. 2025/09/11 17:02:04 client -> Sending packet 2 (55 bytes) for connection 2a85b128ee44ac1a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 1638997097, LowestAcked: 1638997093, AckRanges: {{Largest: 1638997097, Smallest: 1638997097}, {Largest: 1638997094, Smallest: 1638997093}}, DelayTime: 22.201232ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client <- Reading packet 1638997098 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1638997098, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.PingFrame{} 2025/09/11 17:02:04 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:04 client <- Reading packet 1638997100 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1638997100, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 87cf0129dc8798cd1b298d520cc7291ed159, StatelessResetToken: 0x0f7a365c3da676b76e07c39b08b53a4c} 2025/09/11 17:02:04 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:04 client <- &wire.NewTokenFrame{Token: 0x3699e662228f6616cebce17bc7455c9c1dc23e35781df7de8c984d6b7e4faf86f7be77cf11c58ee35b} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:04 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 852, Offset + Data length: 852} 2025/09/11 17:02:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:04 client -> Sending packet 3 (56 bytes) for connection 2a85b128ee44ac1a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 1638997100, LowestAcked: 1638997093, AckRanges: {{Largest: 1638997100, Smallest: 1638997100}, {Largest: 1638997098, Smallest: 1638997097}, {Largest: 1638997094, Smallest: 1638997093}}, DelayTime: 124.333µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:02:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:02:04 client <- Reading packet 1638997102 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 1638997102, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 852, Data length: 172, Offset + Data length: 1024} 2025/09/11 17:02:04 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:04 client -> Sending packet 4 (58 bytes) for connection 2a85b128ee44ac1a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 1638997102, LowestAcked: 1638997093, AckRanges: {{Largest: 1638997102, Smallest: 1638997102}, {Largest: 1638997100, Smallest: 1638997100}, {Largest: 1638997098, Smallest: 1638997097}, {Largest: 1638997094, Smallest: 1638997093}}, DelayTime: 59.621µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:04 client -> Sending packet 5 (40 bytes) for connection 2a85b128ee44ac1a, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: 402bf6860f2199069ce7cf7881f479c8950b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:04 client Connection 2a85b128ee44ac1a closed. 2025/09/11 17:02:04 Requesting https://server4:443/ozqhzhccch. 2025/09/11 17:02:04 Increased receive buffer size to 14336 kiB 2025/09/11 17:02:04 Increased send buffer size to 14336 kiB 2025/09/11 17:02:04 Setting DF for IPv4 and IPv6. 2025/09/11 17:02:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:02:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:02:04 Created qlog file: /logs/qlog/4a5030534aad9f1f907595f46c0af2.sqlog 2025/09/11 17:02:04 client Starting new connection to server4 ([::]:43386 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4a5030534aad9f1f907595f46c0af2, version v1 2025/09/11 17:02:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:02:04 client -> Sending packet 0 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 4a5030534aad9f1f907595f46c0af2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client -> Sending packet 1 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 4a5030534aad9f1f907595f46c0af2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/11 17:02:04 client updated RTT: 33.312979ms (σ: 16.656489ms) 2025/09/11 17:02:04 client <- Received Retry: 2025/09/11 17:02:04 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 2faf18287361e63b9a504c84ec58f7b3e376, Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, Version: v1} 2025/09/11 17:02:04 client Switching destination connection ID to: 2faf18287361e63b9a504c84ec58f7b3e376 2025/09/11 17:02:04 client -> Sending packet 2 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 2faf18287361e63b9a504c84ec58f7b3e376, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:02:04 client -> Sending packet 3 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 2faf18287361e63b9a504c84ec58f7b3e376, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1205, Data length: 28, Offset + Data length: 1233} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:02:04 client -> Sending packet 4 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 2faf18287361e63b9a504c84ec58f7b3e376, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/09/11 17:02:04 client -> Sending packet 5 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 2faf18287361e63b9a504c84ec58f7b3e376, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1205, Data length: 28, Offset + Data length: 1233} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:04 client <- Reading packet 2059220711 (55 bytes) for connection (empty), Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 37430ad12350856b0853117721d2426fc04e, Token: (empty), PacketNumber: 2059220711, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:02:04 client Received first packet. Switching destination connection ID to: 37430ad12350856b0853117721d2426fc04e 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/11 17:02:04 client newly acked packets (1): [4] 2025/09/11 17:02:04 client updated RTT: 33.198ms (σ: 12.719ms) 2025/09/11 17:02:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:02:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:02:04 client -> Sending packet 6 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 37430ad12350856b0853117721d2426fc04e, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1205, Data length: 28, Offset + Data length: 1233} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:04 client -> Sending packet 7 (1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 37430ad12350856b0853117721d2426fc04e, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 7, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1205, Data length: 28, Offset + Data length: 1233} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:02:04 client <- Reading packet 2059220712 (151 bytes) for connection (empty), Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 37430ad12350856b0853117721d2426fc04e, Token: (empty), PacketNumber: 2059220712, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:02:04 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/09/11 17:02:04 client newly acked packets (1): [7] 2025/09/11 17:02:04 client updated RTT: 33.304ms (σ: 9.751ms) 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 265 bytes. 2025/09/11 17:02:04 client <- Reading packet 2059220711 (784 bytes) for connection (empty), Handshake 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 37430ad12350856b0853117721d2426fc04e, PacketNumber: 2059220711, PacketNumberLen: 4, Length: 755, Version: v1} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/11 17:02:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4a5030534aad9f1f907595f46c0af2, InitialSourceConnectionID: 37430ad12350856b0853117721d2426fc04e, RetrySourceConnectionID: 2faf18287361e63b9a504c84ec58f7b3e376, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xb5781ce94bb378e244486e553cce3079, EnableResetStreamAt: false} 2025/09/11 17:02:04 client <- Reading packet 2059220711 (265 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2059220711, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 852ce87e7a6582ecdf75b348049410e93100, StatelessResetToken: 0xdf0630aeb95a20e356eb32a4a82306f9} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6211c7fae2a4d0fdfe6d193da70d6a601039, StatelessResetToken: 0x4f2d28973b7891f79c0a5ad60f9b986e} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, StatelessResetToken: 0xc3fee6f5c23699d504c09ad81269757a} 2025/09/11 17:02:04 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4a5030534aad9f1f907595f46c0af2 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, SrcConnectionID: (empty), Token: 0xb7131f1924f82f4b13e8a160a2e49ded0528d9ddddb19056cbb905044fc7f85fa12edd2cf80b34cb2964cb31447fa0db24cbb674e53b61329723e77a045a5bd3d728d7757fc5fab7d4258c86a1aece5263285d3dad7d67285fda, PacketNumber: 8, PacketNumberLen: 2, Length: 1019, Version: v1} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 2059220712, LowestAcked: 2059220711, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:04 client Short Header{DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:04 client Dropping Initial keys. 2025/09/11 17:02:04 client -> Sending packet 1 (60 bytes) for connection 4a5030534aad9f1f907595f46c0af2, Handshake 2025/09/11 17:02:04 client Long Header{Type: Handshake, DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 2059220711, LowestAcked: 2059220711, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client -> Sending packet 1 (53 bytes) for connection 4a5030534aad9f1f907595f46c0af2, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 2059220711, LowestAcked: 2059220711, DelayTime: 1.203604ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client <- Reading packet 2059220712 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2059220712, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.PingFrame{} 2025/09/11 17:02:04 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:04 client <- Reading packet 2059220713 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2059220713, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7b81032e1df1bb787a2632c94b6617f94162, StatelessResetToken: 0x80684948ea03e7a988fe1a5eb164848a} 2025/09/11 17:02:04 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:04 client Dropping Handshake keys. 2025/09/11 17:02:04 client <- &wire.NewTokenFrame{Token: 0x363e80033b011147996dc95305918cb36cd76bd68d557ae2b3364dc82cc3b73f3888e7654307605eca} 2025/09/11 17:02:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:04 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:02:04 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:04 client -> Sending packet 2 (52 bytes) for connection 4a5030534aad9f1f907595f46c0af2, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.AckFrame{LargestAcked: 2059220713, LowestAcked: 2059220711, DelayTime: 110.056µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:02:04 client <- Reading packet 2059220714 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2059220714, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:02:04 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:04 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:04 client -> Sending packet 3 (40 bytes) for connection 4a5030534aad9f1f907595f46c0af2, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:04 client Short Header{DestConnectionID: fd80b7ffbb34965c4b685997b55ec0792d81, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:04 client Connection 4a5030534aad9f1f907595f46c0af2 closed. 2025/09/11 17:02:04 Requesting https://server4:443/rqonopzohp. 2025/09/11 17:02:04 Increased receive buffer size to 14336 kiB 2025/09/11 17:02:04 Increased send buffer size to 14336 kiB 2025/09/11 17:02:04 Setting DF for IPv4 and IPv6. 2025/09/11 17:02:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:02:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:02:04 Created qlog file: /logs/qlog/8d8f811525873ebd52a860578391c99914fc.sqlog 2025/09/11 17:02:04 client Starting new connection to server4 ([::]:55833 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8d8f811525873ebd52a860578391c99914fc, version v1 2025/09/11 17:02:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:02:04 client -> Sending packet 0 (1280 bytes) for connection 8d8f811525873ebd52a860578391c99914fc, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 8d8f811525873ebd52a860578391c99914fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:04 client -> Sending packet 1 (1280 bytes) for connection 8d8f811525873ebd52a860578391c99914fc, Initial 2025/09/11 17:02:04 client Long Header{Type: Initial, DestConnectionID: 8d8f811525873ebd52a860578391c99914fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 1230, Data length: 287, Offset + Data length: 1517} 2025/09/11 17:02:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:05 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:02:05 client <- Reading packet 600192955 (149 bytes) for connection (empty), Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2eb2e235b5f8034f3eddf32d57d5b5c7e7e, Token: (empty), PacketNumber: 600192955, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:02:05 client Received first packet. Switching destination connection ID to: b2eb2e235b5f8034f3eddf32d57d5b5c7e7e 2025/09/11 17:02:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:02:05 client newly acked packets (2): [0 1] 2025/09/11 17:02:05 client updated RTT: 34.498722ms (σ: 17.249361ms) 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Parsed a coalesced packet. Part 2: 767 bytes. Remaining: 284 bytes. 2025/09/11 17:02:05 client <- Reading packet 600192954 (767 bytes) for connection (empty), Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2eb2e235b5f8034f3eddf32d57d5b5c7e7e, PacketNumber: 600192954, PacketNumberLen: 4, Length: 738, Version: v1} 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/11 17:02:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8d8f811525873ebd52a860578391c99914fc, InitialSourceConnectionID: b2eb2e235b5f8034f3eddf32d57d5b5c7e7e, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x70b6336c8c222b36e0bd3a082730ecb5, EnableResetStreamAt: false} 2025/09/11 17:02:05 client <- Reading packet 600192954 (284 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 600192954, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84aa23bc3ca51f1c43caf2108b3476616ea9, StatelessResetToken: 0x1168769a9260d741dd936303c85f5ddd} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55fc5a5dab64ff2abafaf7d247ec7ed5d8d3, StatelessResetToken: 0x4e09cb02e99d16d7b134706a223a6ba1} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15d4da0a8c945466b021d70b649dd394c004, StatelessResetToken: 0x2998bb06066f25eaa230e8a8f425a41f} 2025/09/11 17:02:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8d8f811525873ebd52a860578391c99914fc 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 600192955, LowestAcked: 600192955, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:05 client Short Header{DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:05 client Dropping Initial keys. 2025/09/11 17:02:05 client -> Sending packet 1 (56 bytes) for connection 8d8f811525873ebd52a860578391c99914fc, Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 600192954, LowestAcked: 600192954, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client -> Sending packet 1 (49 bytes) for connection 8d8f811525873ebd52a860578391c99914fc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 600192954, LowestAcked: 600192954, DelayTime: 765.804µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client <- Reading packet 600192955 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 600192955, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.PingFrame{} 2025/09/11 17:02:05 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:05 client <- Reading packet 600192956 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 600192956, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dd890a7565547053d97ea755cb9db13cd475, StatelessResetToken: 0x1402cd081ac1c78ec9b3188b74b1374f} 2025/09/11 17:02:05 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:05 client Dropping Handshake keys. 2025/09/11 17:02:05 client <- &wire.NewTokenFrame{Token: 0x36f0f5a3ec2018b7409541ff1efaf0621b5a9f3eb227f99462c53757f14bed33f6152792c784a3b995} 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/11 17:02:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:05 client -> Sending packet 2 (48 bytes) for connection 8d8f811525873ebd52a860578391c99914fc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 600192956, LowestAcked: 600192954, DelayTime: 93.785µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client <- Reading packet 600192957 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 600192957, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/09/11 17:02:05 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:05 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:05 client -> Sending packet 3 (40 bytes) for connection 8d8f811525873ebd52a860578391c99914fc, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: 15d4da0a8c945466b021d70b649dd394c004, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:05 client Connection 8d8f811525873ebd52a860578391c99914fc closed. 2025/09/11 17:02:05 Requesting https://server4:443/jcaifwsiaa. 2025/09/11 17:02:05 Increased receive buffer size to 14336 kiB 2025/09/11 17:02:05 Increased send buffer size to 14336 kiB 2025/09/11 17:02:05 Setting DF for IPv4 and IPv6. 2025/09/11 17:02:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:02:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:02:05 Created qlog file: /logs/qlog/e41806260f38c72de7f5d8.sqlog 2025/09/11 17:02:05 client Starting new connection to server4 ([::]:57007 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e41806260f38c72de7f5d8, version v1 2025/09/11 17:02:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:02:05 client -> Sending packet 0 (1280 bytes) for connection e41806260f38c72de7f5d8, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: e41806260f38c72de7f5d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:05 client -> Sending packet 1 (1280 bytes) for connection e41806260f38c72de7f5d8, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: e41806260f38c72de7f5d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/11 17:02:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:02:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 17:02:05 client -> Sending packet 2 (1280 bytes) for connection e41806260f38c72de7f5d8, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: e41806260f38c72de7f5d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:05 client -> Sending packet 3 (1280 bytes) for connection e41806260f38c72de7f5d8, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: e41806260f38c72de7f5d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/11 17:02:05 client <- Reading packet 632780919 (55 bytes) for connection (empty), Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75e94e95142e596c506a32718802e4540cf7, Token: (empty), PacketNumber: 632780919, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:02:05 client Received first packet. Switching destination connection ID to: 75e94e95142e596c506a32718802e4540cf7 2025/09/11 17:02:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/11 17:02:05 client newly acked packets (1): [2] 2025/09/11 17:02:05 client updated RTT: 32.349718ms (σ: 16.174859ms) 2025/09/11 17:02:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:02:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 17:02:05 client -> Sending packet 4 (1280 bytes) for connection e41806260f38c72de7f5d8, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: 75e94e95142e596c506a32718802e4540cf7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/11 17:02:05 client -> Sending packet 5 (1280 bytes) for connection e41806260f38c72de7f5d8, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: 75e94e95142e596c506a32718802e4540cf7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/11 17:02:05 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/09/11 17:02:05 client <- Reading packet 632780920 (151 bytes) for connection (empty), Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75e94e95142e596c506a32718802e4540cf7, Token: (empty), PacketNumber: 632780920, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/11 17:02:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/11 17:02:05 client newly acked packets (1): [5] 2025/09/11 17:02:05 client updated RTT: 32.581ms (σ: 12.595ms) 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 290 bytes. 2025/09/11 17:02:05 client <- Reading packet 632780919 (759 bytes) for connection (empty), Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 75e94e95142e596c506a32718802e4540cf7, PacketNumber: 632780919, PacketNumberLen: 4, Length: 730, Version: v1} 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/11 17:02:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e41806260f38c72de7f5d8, InitialSourceConnectionID: 75e94e95142e596c506a32718802e4540cf7, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xe61540acc42d380dd49f2027133f2c82, EnableResetStreamAt: false} 2025/09/11 17:02:05 client <- Reading packet 632780919 (290 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 632780919, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f7ed6582d2cfa6fa1be912afbd8f1bdbeebc, StatelessResetToken: 0x896b1e2ff8b4d32aba9de3bc9d637dfc} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e335746949a9c1fde77ae1a1d36a1e911ecc, StatelessResetToken: 0x68d1046113f7b2952729819fe6f72eab} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, StatelessResetToken: 0x04228a8fc7b6d28dc6f8c7d00e362c82} 2025/09/11 17:02:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e41806260f38c72de7f5d8 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 632780920, LowestAcked: 632780919, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:05 client Short Header{DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:05 client Dropping Initial keys. 2025/09/11 17:02:05 client -> Sending packet 1 (56 bytes) for connection e41806260f38c72de7f5d8, Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 632780919, LowestAcked: 632780919, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client -> Sending packet 1 (49 bytes) for connection e41806260f38c72de7f5d8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 632780919, LowestAcked: 632780919, DelayTime: 640.779µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client -> Sending packet 2 (56 bytes) for connection e41806260f38c72de7f5d8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:05 client <- Reading packet 632780920 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 632780920, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.PingFrame{} 2025/09/11 17:02:05 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:05 client <- Reading packet 632780922 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 632780922, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/09/11 17:02:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:05 client -> Sending packet 3 (50 bytes) for connection e41806260f38c72de7f5d8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 632780922, LowestAcked: 632780919, AckRanges: {{Largest: 632780922, Smallest: 632780922}, {Largest: 632780920, Smallest: 632780919}}, DelayTime: 69.6µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client <- Reading packet 632780923 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 632780923, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.PingFrame{} 2025/09/11 17:02:05 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:05 client <- Reading packet 632780924 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 632780924, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d904f03f4e46733a4b40888b15924ff86bb1, StatelessResetToken: 0x9571a4d966cc56489a7f0f1773f85da0} 2025/09/11 17:02:05 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:05 client Dropping Handshake keys. 2025/09/11 17:02:05 client <- &wire.NewTokenFrame{Token: 0x362634e41f5fc60a6f7d1f91c9b499bc9e44d0a1290393e5caa34bb7dce9709d4330b0527159fa891b} 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/11 17:02:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:05 client -> Sending packet 4 (50 bytes) for connection e41806260f38c72de7f5d8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 632780924, LowestAcked: 632780919, AckRanges: {{Largest: 632780924, Smallest: 632780922}, {Largest: 632780920, Smallest: 632780919}}, DelayTime: 126.076µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:05 client -> Sending packet 5 (40 bytes) for connection e41806260f38c72de7f5d8, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: b4b3c9d0bb2e8ab3a4fe715ce9f7a118f987, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:05 client Connection e41806260f38c72de7f5d8 closed. 2025/09/11 17:02:05 Requesting https://server4:443/qvpudeybvo. 2025/09/11 17:02:05 Increased receive buffer size to 14336 kiB 2025/09/11 17:02:05 Increased send buffer size to 14336 kiB 2025/09/11 17:02:05 Setting DF for IPv4 and IPv6. 2025/09/11 17:02:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 17:02:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 17:02:05 Created qlog file: /logs/qlog/f6b05498f45f688df02d717c.sqlog 2025/09/11 17:02:05 client Starting new connection to server4 ([::]:54381 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f6b05498f45f688df02d717c, version v1 2025/09/11 17:02:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 17:02:05 client -> Sending packet 0 (1280 bytes) for connection f6b05498f45f688df02d717c, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: f6b05498f45f688df02d717c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 17:02:05 client -> Sending packet 1 (1280 bytes) for connection f6b05498f45f688df02d717c, Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: f6b05498f45f688df02d717c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 1236, Data length: 280, Offset + Data length: 1516} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 17:02:05 client <- Reading packet 1094984525 (55 bytes) for connection (empty), Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a557b50eca29bbd242b93bd8963f016e2cc, Token: (empty), PacketNumber: 1094984525, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/11 17:02:05 client Received first packet. Switching destination connection ID to: 4a557b50eca29bbd242b93bd8963f016e2cc 2025/09/11 17:02:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:02:05 client newly acked packets (1): [0] 2025/09/11 17:02:05 client updated RTT: 32.073394ms (σ: 16.036697ms) 2025/09/11 17:02:05 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/11 17:02:05 client <- Reading packet 1094984526 (149 bytes) for connection (empty), Initial 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a557b50eca29bbd242b93bd8963f016e2cc, Token: (empty), PacketNumber: 1094984526, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/11 17:02:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/11 17:02:05 client newly acked packets (1): [1] 2025/09/11 17:02:05 client updated RTT: 32.374ms (σ: 12.629ms) 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 17:02:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 290 bytes. 2025/09/11 17:02:05 client <- Reading packet 1094984525 (761 bytes) for connection (empty), Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4a557b50eca29bbd242b93bd8963f016e2cc, PacketNumber: 1094984525, PacketNumberLen: 4, Length: 732, Version: v1} 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/11 17:02:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 17:02:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f6b05498f45f688df02d717c, InitialSourceConnectionID: 4a557b50eca29bbd242b93bd8963f016e2cc, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x6a9d820125085be52484af6e9b854a73, EnableResetStreamAt: false} 2025/09/11 17:02:05 client <- Reading packet 1094984525 (290 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984525, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 414d528c11e7c1b2246978e8abc96c1f8974, StatelessResetToken: 0x235362e0820e3f8407d9617645e1f0ad} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bf45738e9ac08495a930aca695c93403b588, StatelessResetToken: 0xe9c79030204301ab3968d0342d202f3d} 2025/09/11 17:02:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, StatelessResetToken: 0xf179a249cb90932ae823730e8486a88c} 2025/09/11 17:02:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 17:02:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f6b05498f45f688df02d717c 2025/09/11 17:02:05 client Long Header{Type: Initial, DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1110, Version: v1} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 1094984526, LowestAcked: 1094984525, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:05 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:05 client Dropping Initial keys. 2025/09/11 17:02:05 client -> Sending packet 1 (60 bytes) for connection f6b05498f45f688df02d717c, Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 1094984525, LowestAcked: 1094984525, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client -> Sending packet 1 (53 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 1094984525, LowestAcked: 1094984525, DelayTime: 748.442µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 17:02:05 client -> Sending packet 2 (84 bytes) for connection f6b05498f45f688df02d717c, Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:05 client -> Sending packet 3 (84 bytes) for connection f6b05498f45f688df02d717c, Handshake 2025/09/11 17:02:05 client Long Header{Type: Handshake, DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 17:02:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 17:02:05 client <- Reading packet 1094984526 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984526, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.PingFrame{} 2025/09/11 17:02:05 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:05 client <- Reading packet 1094984527 (1200 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984527, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.HandshakeDoneFrame{} 2025/09/11 17:02:05 client Dropping Handshake keys. 2025/09/11 17:02:05 client <- &wire.NewTokenFrame{Token: 0x366a4916ad0009a5e2848e258181369127d86c3a27f20761c87a9ff3a4a13c070380fc7ec204f8a56b} 2025/09/11 17:02:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/11 17:02:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 17:02:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/11 17:02:05 client -> Sending packet 3 (73 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.AckFrame{LargestAcked: 1094984527, LowestAcked: 1094984525, DelayTime: 114.003µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:05 client -> Sending packet 4 (58 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:05 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 17:02:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 17:02:05 client <- Reading packet 1094984529 (40 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984529, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 13.552ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 17:02:05 client newly acked packets (1): [4] 2025/09/11 17:02:05 client updated RTT: 33.865ms (σ: 12.454ms) 2025/09/11 17:02:05 client ECN capability confirmed. 2025/09/11 17:02:05 client Canceling loss detection timer. 2025/09/11 17:02:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/11 17:02:06 client <- Reading packet 1094984530 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984530, PacketNumberLen: 4, KeyPhase: 0} 2025/09/11 17:02:06 client <- &wire.PingFrame{} 2025/09/11 17:02:06 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:06 client -> Sending packet 5 (1366 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:06 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:06 client -> &wire.PingFrame{} 2025/09/11 17:02:06 client -> Sending packet 6 (54 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:06 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:06 client -> &wire.AckFrame{LargestAcked: 1094984530, LowestAcked: 1094984525, AckRanges: {{Largest: 1094984530, Smallest: 1094984529}, {Largest: 1094984527, Smallest: 1094984525}}, DelayTime: 142.096µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 17:02:06 client <- Reading packet 1094984531 (1444 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984531, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:06 client <- &wire.PingFrame{} 2025/09/11 17:02:06 client Setting ACK timer to max ack delay: 25ms 2025/09/11 17:02:06 client Sending ACK because the ACK timer expired. 2025/09/11 17:02:06 client -> Sending packet 7 (55 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:06 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:06 client -> &wire.AckFrame{LargestAcked: 1094984531, LowestAcked: 1094984525, AckRanges: {{Largest: 1094984531, Smallest: 1094984529}, {Largest: 1094984527, Smallest: 1094984525}}, DelayTime: 25.276106ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 17:02:06 client <- Reading packet 1094984535 (1406 bytes) for connection (empty), 1-RTT 2025/09/11 17:02:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1094984535, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 17:02:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ac523bdcf5ef19ba5eef2ba1a08724234eda, StatelessResetToken: 0x8768b89bd5ff53c9ecefb8c92cdbd800} 2025/09/11 17:02:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 17:02:06 client Queuing ACK because there's a new missing packet to report. 2025/09/11 17:02:06 client -> Sending packet 8 (56 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:06 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:06 client -> &wire.AckFrame{LargestAcked: 1094984535, LowestAcked: 1094984525, AckRanges: {{Largest: 1094984535, Smallest: 1094984535}, {Largest: 1094984531, Smallest: 1094984529}, {Largest: 1094984527, Smallest: 1094984525}}, DelayTime: 88.245µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 17:02:06 client Closing connection with error: Application error 0x0 (local) 2025/09/11 17:02:06 client -> Sending packet 9 (40 bytes) for connection f6b05498f45f688df02d717c, 1-RTT (ECN: ECT(0)) 2025/09/11 17:02:06 client Short Header{DestConnectionID: 017e075771633c7a6b1fbd2f7b1ce7c38b0b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 17:02:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 17:02:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 17:02:06 client Connection f6b05498f45f688df02d717c closed.