2025/12/13 17:12:09 Requesting https://server4:443/ashamed-enough-camera. 2025/12/13 17:12:09 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:09 Increased send buffer size to 14336 kiB 2025/12/13 17:12:09 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:09 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:09 Created qlog file: /logs/qlog/d362eb207fd93434ae51211a70.sqlog 2025/12/13 17:12:09 client Starting new connection to server4 ([::]:43642 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d362eb207fd93434ae51211a70, version v1 2025/12/13 17:12:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:09 client -> Sending packet 0 (1280 bytes) for connection d362eb207fd93434ae51211a70, Initial 2025/12/13 17:12:09 client Long Header{Type: Initial, DestConnectionID: d362eb207fd93434ae51211a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 17:12:09 client -> Sending packet 1 (1280 bytes) for connection d362eb207fd93434ae51211a70, Initial 2025/12/13 17:12:09 client Long Header{Type: Initial, DestConnectionID: d362eb207fd93434ae51211a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 1235, Data length: 278, Offset + Data length: 1513} 2025/12/13 17:12:09 client <- Reading packet 17339866 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f2849874ae62b50cad3ec2b89bce8e8c2014, Token: (empty), PacketNumber: 17339866, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:09 client Received first packet. Switching destination connection ID to: f2849874ae62b50cad3ec2b89bce8e8c2014 2025/12/13 17:12:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:09 client newly acked packets (1): [0] 2025/12/13 17:12:09 client updated RTT: 37.514047ms (σ: 18.757023ms) 2025/12/13 17:12:09 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:09 client <- Reading packet 17339867 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f2849874ae62b50cad3ec2b89bce8e8c2014, Token: (empty), PacketNumber: 17339867, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:09 client newly acked packets (1): [1] 2025/12/13 17:12:09 client updated RTT: 37.796ms (σ: 14.633ms) 2025/12/13 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:09 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 288 bytes. 2025/12/13 17:12:09 client <- Reading packet 17339866 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f2849874ae62b50cad3ec2b89bce8e8c2014, PacketNumber: 17339866, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d362eb207fd93434ae51211a70, InitialSourceConnectionID: f2849874ae62b50cad3ec2b89bce8e8c2014, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xb458c0821a64ce73ec93ef25dd256f99, EnableResetStreamAt: false} 2025/12/13 17:12:09 client <- Reading packet 17339866 (288 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:09 client Short Header{DestConnectionID: (empty), PacketNumber: 17339866, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b60be87626492bd43db7534261b1f46fd10, StatelessResetToken: 0xb6cbce8942d76abe4ece6cb141170c17} 2025/12/13 17:12:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5742e3572a00cb6927d3f5a3d607ed04faf5, StatelessResetToken: 0x174fb8b8c3b647f5e6c58322feacb9fc} 2025/12/13 17:12:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a55e87a80a603ea7e2660965ba66a769119f, StatelessResetToken: 0xd739b682faf67bed2efe3efb261eb585} 2025/12/13 17:12:09 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d362eb207fd93434ae51211a70 2025/12/13 17:12:09 client Long Header{Type: Initial, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1076, Version: v1} 2025/12/13 17:12:09 client -> &wire.AckFrame{LargestAcked: 17339867, LowestAcked: 17339866, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:09 client -> &wire.AckFrame{LargestAcked: 17339866, LowestAcked: 17339866, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:09 client Short Header{DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:09 client -> &wire.AckFrame{LargestAcked: 17339866, LowestAcked: 17339866, DelayTime: 726.656µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:09 client Dropping Initial keys. 2025/12/13 17:12:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:09 client -> Sending packet 1 (84 bytes) for connection d362eb207fd93434ae51211a70, Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:09 client -> Sending packet 2 (84 bytes) for connection d362eb207fd93434ae51211a70, Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 17:12:09 client -> Sending packet 3 (84 bytes) for connection d362eb207fd93434ae51211a70, Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:09 client -> Sending packet 4 (84 bytes) for connection d362eb207fd93434ae51211a70, Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:09 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:09 client Dropping initial packet (144 bytes) because we already dropped the keys. 2025/12/13 17:12:09 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 293 bytes. 2025/12/13 17:12:09 client <- Reading packet 17339867 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f2849874ae62b50cad3ec2b89bce8e8c2014, PacketNumber: 17339867, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:09 client <- Reading packet 17339867 (293 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:09 client Short Header{DestConnectionID: (empty), PacketNumber: 17339867, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:09 client -> Sending packet 5 (56 bytes) for connection d362eb207fd93434ae51211a70, Handshake 2025/12/13 17:12:09 client Long Header{Type: Handshake, DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 29, Version: v1} 2025/12/13 17:12:09 client -> &wire.AckFrame{LargestAcked: 17339867, LowestAcked: 17339866, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:09 client <- Reading packet 17339869 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:09 client Short Header{DestConnectionID: (empty), PacketNumber: 17339869, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:09 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:09 client Dropping Handshake keys. 2025/12/13 17:12:09 client <- &wire.NewTokenFrame{Token: 0x36cfc3de20cf899c273c8607470f9fd4a2e128491ec95f0871e0b731fb7eb35e40e3dcfc48b6dad74c} 2025/12/13 17:12:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:09 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:09 client -> Sending packet 2 (82 bytes) for connection d362eb207fd93434ae51211a70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:09 client Short Header{DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:09 client -> &wire.AckFrame{LargestAcked: 17339869, LowestAcked: 17339866, AckRanges: {{Largest: 17339869, Smallest: 17339869}, {Largest: 17339867, Smallest: 17339866}}, DelayTime: 93.805µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:09 client -> Sending packet 3 (69 bytes) for connection d362eb207fd93434ae51211a70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:09 client Short Header{DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:10 client <- Reading packet 17339871 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 17339871, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6590066a776c5ee634fa4702bf639fe6142e, StatelessResetToken: 0xf0b805d6d3200fd5932ab5713b341582} 2025/12/13 17:12:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:10 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:10 client -> Sending packet 4 (52 bytes) for connection d362eb207fd93434ae51211a70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 17339871, LowestAcked: 17339866, AckRanges: {{Largest: 17339871, Smallest: 17339871}, {Largest: 17339869, Smallest: 17339869}, {Largest: 17339867, Smallest: 17339866}}, DelayTime: 114.754µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:10 client -> Sending packet 5 (40 bytes) for connection d362eb207fd93434ae51211a70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: a55e87a80a603ea7e2660965ba66a769119f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:10 client Connection d362eb207fd93434ae51211a70 closed. 2025/12/13 17:12:10 Requesting https://server4:443/cruel-heavy-wallet. 2025/12/13 17:12:10 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:10 Increased send buffer size to 14336 kiB 2025/12/13 17:12:10 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:10 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:10 Created qlog file: /logs/qlog/d8d500f51bf58cef1db723726440827587e2.sqlog 2025/12/13 17:12:10 client Starting new connection to server4 ([::]:45573 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8d500f51bf58cef1db723726440827587e2, version v1 2025/12/13 17:12:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:10 client -> Sending packet 0 (1280 bytes) for connection d8d500f51bf58cef1db723726440827587e2, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: d8d500f51bf58cef1db723726440827587e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:10 client -> Sending packet 1 (1280 bytes) for connection d8d500f51bf58cef1db723726440827587e2, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: d8d500f51bf58cef1db723726440827587e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1230, Data length: 276, Offset + Data length: 1506} 2025/12/13 17:12:10 client <- Reading packet 1765015449 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2878a509c99e44eb382f994d6c452c6ff3fe, Token: (empty), PacketNumber: 1765015449, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:10 client Received first packet. Switching destination connection ID to: 2878a509c99e44eb382f994d6c452c6ff3fe 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:10 client newly acked packets (1): [0] 2025/12/13 17:12:10 client updated RTT: 32.33884ms (σ: 16.16942ms) 2025/12/13 17:12:10 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:10 client <- Reading packet 1765015450 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2878a509c99e44eb382f994d6c452c6ff3fe, Token: (empty), PacketNumber: 1765015450, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:10 client newly acked packets (1): [1] 2025/12/13 17:12:10 client updated RTT: 32.636ms (σ: 12.723ms) 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/12/13 17:12:10 client <- Reading packet 1765015449 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2878a509c99e44eb382f994d6c452c6ff3fe, PacketNumber: 1765015449, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8d500f51bf58cef1db723726440827587e2, InitialSourceConnectionID: 2878a509c99e44eb382f994d6c452c6ff3fe, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xef68682fd3e00f567b77305f6592f90b, EnableResetStreamAt: false} 2025/12/13 17:12:10 client <- Reading packet 1765015449 (283 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1765015449, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2c274c51518452e29300b3fddf6d0d8fbfc5, StatelessResetToken: 0x42d3d2ef0e6f83c3e0eee8bc79afee48} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fa7b358c6003342a5d3b8ab5e22362e7c42b, StatelessResetToken: 0xa7360db775db30dd29cdcf100949c296} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, StatelessResetToken: 0x297355f51320ea642fd2c56803dd77a5} 2025/12/13 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8d500f51bf58cef1db723726440827587e2 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1765015450, LowestAcked: 1765015449, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Long Header{Type: Handshake, DestConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1765015449, LowestAcked: 1765015449, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:10 client Short Header{DestConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1765015449, LowestAcked: 1765015449, DelayTime: 622.791µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:10 client Dropping Initial keys. 2025/12/13 17:12:10 client -> Sending packet 1 (64 bytes) for connection d8d500f51bf58cef1db723726440827587e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 17:12:10 client <- Reading packet 1765015451 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1765015451, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 360µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Peer doesn't await address validation any longer. 2025/12/13 17:12:10 client newly acked packets (2): [0 1] 2025/12/13 17:12:10 client Ignoring all packets below 1765015450. 2025/12/13 17:12:10 client updated RTT: 32.81ms (σ: 9.891ms) 2025/12/13 17:12:10 client ECN capability confirmed. 2025/12/13 17:12:10 client Canceling loss detection timer. 2025/12/13 17:12:10 client Dropping Handshake keys. 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4262f667e1b8b4a34c34a4ffbfee5f36e5c6, StatelessResetToken: 0x57465fde083dfd67d5260eed5a883182} 2025/12/13 17:12:10 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:10 client <- &wire.NewTokenFrame{Token: 0x363f4736824ff0d4b042e7ce41335c61eaf6ae04b7e35e498c861f3265484e5df072fc2b32890903d1} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:10 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:10 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:10 client -> Sending packet 2 (52 bytes) for connection d8d500f51bf58cef1db723726440827587e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1765015451, LowestAcked: 1765015451, DelayTime: 136.695µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client <- Reading packet 1765015452 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1765015452, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:10 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:10 client -> Sending packet 3 (40 bytes) for connection d8d500f51bf58cef1db723726440827587e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: d72843fbfa26f7ed8118f69b61f0adc27ea1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:10 client Connection d8d500f51bf58cef1db723726440827587e2 closed. 2025/12/13 17:12:10 Requesting https://server4:443/severe-brown-charmander. 2025/12/13 17:12:10 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:10 Increased send buffer size to 14336 kiB 2025/12/13 17:12:10 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:10 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:10 Created qlog file: /logs/qlog/d4839ac859d0e82d.sqlog 2025/12/13 17:12:10 client Starting new connection to server4 ([::]:46493 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d4839ac859d0e82d, version v1 2025/12/13 17:12:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:10 client -> Sending packet 0 (1280 bytes) for connection d4839ac859d0e82d, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: d4839ac859d0e82d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 17:12:10 client -> Sending packet 1 (1280 bytes) for connection d4839ac859d0e82d, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: d4839ac859d0e82d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1240, Data length: 268, Offset + Data length: 1508} 2025/12/13 17:12:10 client <- Reading packet 1829187162 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f86389c076e7a6fa28613be5036088b855f4, Token: (empty), PacketNumber: 1829187162, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:10 client Received first packet. Switching destination connection ID to: f86389c076e7a6fa28613be5036088b855f4 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:10 client newly acked packets (1): [0] 2025/12/13 17:12:10 client updated RTT: 32.121535ms (σ: 16.060767ms) 2025/12/13 17:12:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:10 client -> Sending packet 2 (1280 bytes) for connection d4839ac859d0e82d, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: f86389c076e7a6fa28613be5036088b855f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1240, Data length: 268, Offset + Data length: 1508} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> Sending packet 3 (1280 bytes) for connection d4839ac859d0e82d, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: f86389c076e7a6fa28613be5036088b855f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1240, Data length: 268, Offset + Data length: 1508} 2025/12/13 17:12:10 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:10 client <- Reading packet 1829187164 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f86389c076e7a6fa28613be5036088b855f4, Token: (empty), PacketNumber: 1829187164, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 292 bytes. 2025/12/13 17:12:10 client <- Reading packet 1829187163 (759 bytes) for connection (empty), Handshake 2025/12/13 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f86389c076e7a6fa28613be5036088b855f4, PacketNumber: 1829187163, PacketNumberLen: 4, Length: 730, Version: v1} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/12/13 17:12:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d4839ac859d0e82d, InitialSourceConnectionID: f86389c076e7a6fa28613be5036088b855f4, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x353e616bb98a335bce503efabc97bb96, EnableResetStreamAt: false} 2025/12/13 17:12:10 client <- Reading packet 1829187163 (292 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1829187163, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:10 client <- Reading packet 1829187165 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f86389c076e7a6fa28613be5036088b855f4, Token: (empty), PacketNumber: 1829187165, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:10 client newly acked packets (1): [3] 2025/12/13 17:12:10 client updated RTT: 32.22ms (σ: 12.243ms) 2025/12/13 17:12:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d4839ac859d0e82d 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: f86389c076e7a6fa28613be5036088b855f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1153, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1829187165, LowestAcked: 1829187162, AckRanges: {{Largest: 1829187165, Smallest: 1829187164}, {Largest: 1829187162, Smallest: 1829187162}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Long Header{Type: Handshake, DestConnectionID: f86389c076e7a6fa28613be5036088b855f4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1829187163, LowestAcked: 1829187163, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:10 client Dropping Initial keys. 2025/12/13 17:12:10 client -> Sending packet 0 (69 bytes) for connection d4839ac859d0e82d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: f86389c076e7a6fa28613be5036088b855f4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 17:12:10 client <- Reading packet 1829187165 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1829187165, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:10 client Dropping Handshake keys. 2025/12/13 17:12:10 client <- &wire.NewTokenFrame{Token: 0x36aac13095d6af2554069e6c209e6fb446a4b6f9cd528ecdf5f82f9d901a75f8f95373139e5f6e4e2b} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:10 client <- Reading packet 1829187166 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1829187166, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fc618d5732ff2e32d8879dba18b0f39be734, StatelessResetToken: 0xbee10c197e2394ed2111756a902b8013} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6ec876ffd8ca6810555df3bd6b7ed7d4c24d, StatelessResetToken: 0x0abd227b4d6948d520eac6a36d8f48a7} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a1131f558c316879c9deec10e6e8da05ee2, StatelessResetToken: 0xedcc52ffc9de325e0c396c36beeda754} 2025/12/13 17:12:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:10 client -> Sending packet 1 (56 bytes) for connection d4839ac859d0e82d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 9a1131f558c316879c9deec10e6e8da05ee2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1829187166, LowestAcked: 1829187163, AckRanges: {{Largest: 1829187166, Smallest: 1829187165}, {Largest: 1829187163, Smallest: 1829187163}}, DelayTime: 69.81µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:10 client <- Reading packet 1829187168 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1829187168, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 4.376ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client newly acked packets (1): [1] 2025/12/13 17:12:10 client Ignoring all packets below 1829187167. 2025/12/13 17:12:10 client updated RTT: 32.569ms (σ: 9.881ms) 2025/12/13 17:12:10 client ECN capability confirmed. 2025/12/13 17:12:10 client lost packet 0 (time threshold) 2025/12/13 17:12:10 client Canceling loss detection timer. 2025/12/13 17:12:10 client -> Sending packet 2 (69 bytes) for connection d4839ac859d0e82d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 9a1131f558c316879c9deec10e6e8da05ee2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 17:12:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:10 client <- Reading packet 1829187169 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1829187169, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:10 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:10 client -> Sending packet 3 (52 bytes) for connection d4839ac859d0e82d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 9a1131f558c316879c9deec10e6e8da05ee2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 1829187169, LowestAcked: 1829187168, DelayTime: 80.38µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:10 client -> Sending packet 4 (40 bytes) for connection d4839ac859d0e82d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 9a1131f558c316879c9deec10e6e8da05ee2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:10 client Connection d4839ac859d0e82d closed. 2025/12/13 17:12:10 Requesting https://server4:443/numerous-infinite-suicune. 2025/12/13 17:12:10 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:10 Increased send buffer size to 14336 kiB 2025/12/13 17:12:10 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:10 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:10 Created qlog file: /logs/qlog/0739fb651fb44de289733644adc07afd.sqlog 2025/12/13 17:12:10 client Starting new connection to server4 ([::]:51190 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0739fb651fb44de289733644adc07afd, version v1 2025/12/13 17:12:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:10 client -> Sending packet 0 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: 0739fb651fb44de289733644adc07afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:10 client -> Sending packet 1 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: 0739fb651fb44de289733644adc07afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1232, Data length: 274, Offset + Data length: 1506} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:10 client -> Sending packet 2 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: 0739fb651fb44de289733644adc07afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:10 client -> Sending packet 3 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: 0739fb651fb44de289733644adc07afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1232, Data length: 274, Offset + Data length: 1506} 2025/12/13 17:12:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:10 client <- Reading packet 5701545 (1200 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, Token: (empty), PacketNumber: 5701545, PacketNumberLen: 3, Length: 1170, Version: v1} 2025/12/13 17:12:10 client Received first packet. Switching destination connection ID to: c5bfbcb662cd70484b1fc50a353305e2ce0a 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:10 client newly acked packets (1): [2] 2025/12/13 17:12:10 client updated RTT: 32.778319ms (σ: 16.389159ms) 2025/12/13 17:12:10 client <- &wire.PingFrame{} 2025/12/13 17:12:10 client -> Sending packet 4 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701545, LowestAcked: 5701545, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:10 client -> Sending packet 5 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1232, Data length: 274, Offset + Data length: 1506} 2025/12/13 17:12:10 client -> Sending packet 6 (1280 bytes) for connection 0739fb651fb44de289733644adc07afd, Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 1232, Data length: 274, Offset + Data length: 1506} 2025/12/13 17:12:10 client Parsed a coalesced packet. Part 1: 152 bytes. Remaining: 1048 bytes. 2025/12/13 17:12:10 client <- Reading packet 5701546 (152 bytes) for connection (empty), Initial 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, Token: (empty), PacketNumber: 5701546, PacketNumberLen: 3, Length: 122, Version: v1} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 283 bytes. 2025/12/13 17:12:10 client <- Reading packet 5701544 (765 bytes) for connection (empty), Handshake 2025/12/13 17:12:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, PacketNumber: 5701544, PacketNumberLen: 3, Length: 736, Version: v1} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/12/13 17:12:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0739fb651fb44de289733644adc07afd, InitialSourceConnectionID: c5bfbcb662cd70484b1fc50a353305e2ce0a, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xbbc05f14bb1f83817efe55faf0f9e625, EnableResetStreamAt: false} 2025/12/13 17:12:10 client <- Reading packet 5701544 (283 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701544, PacketNumberLen: 3, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 387a06bfec1e0931c2e3cb7332e2a3ef35de, StatelessResetToken: 0x731ffb79959d28f9a1fe7aef646cf85a} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0e76bc998f546938e9ef77c07f2487f40d4, StatelessResetToken: 0x806d4e1b40bfd876d205a25171570a0b} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, StatelessResetToken: 0xdbb2f2d8cc60ae328d4c29373054eca1} 2025/12/13 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0739fb651fb44de289733644adc07afd 2025/12/13 17:12:10 client Long Header{Type: Initial, DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701546, LowestAcked: 5701545, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client Long Header{Type: Handshake, DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701544, LowestAcked: 5701544, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701544, LowestAcked: 5701544, DelayTime: 675.541µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:10 client Dropping Initial keys. 2025/12/13 17:12:10 client -> Sending packet 1 (71 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:10 client <- Reading packet 5701546 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701546, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e12244d999b1a3792de43b620532cde7cb01, StatelessResetToken: 0xfaf3fa59367a103806195c5db5538925} 2025/12/13 17:12:10 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:10 client Dropping Handshake keys. 2025/12/13 17:12:10 client <- &wire.NewTokenFrame{Token: 0x36a025835485ed883f15ba70dacd3ceafe37420dbe457485fa93d59dd328ee4643f7999e056f4b366d} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:10 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:10 client -> Sending packet 2 (50 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701546, LowestAcked: 5701544, AckRanges: {{Largest: 5701546, Smallest: 5701546}, {Largest: 5701544, Smallest: 5701544}}, DelayTime: 126.977µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client <- Reading packet 5701547 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701547, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.832ms} 2025/12/13 17:12:10 client newly acked packets (1): [0] 2025/12/13 17:12:10 client Ignoring all packets below 5701545. 2025/12/13 17:12:10 client updated RTT: 33.251ms (σ: 13.238ms) 2025/12/13 17:12:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:10 client -> Sending packet 4 (71 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:10 client -> Sending packet 5 (71 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:10 client <- Reading packet 5701548 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701548, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.PingFrame{} 2025/12/13 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:10 client <- Reading packet 5701549 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701549, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e12244d999b1a3792de43b620532cde7cb01, StatelessResetToken: 0xfaf3fa59367a103806195c5db5538925} 2025/12/13 17:12:10 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:10 client <- &wire.NewTokenFrame{Token: 0x36a025835485ed883f15ba70dacd3ceafe37420dbe457485fa93d59dd328ee4643f7999e056f4b366d} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:10 client -> Sending packet 6 (48 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701549, LowestAcked: 5701546, DelayTime: 105.797µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client <- Reading packet 5701550 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701550, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e12244d999b1a3792de43b620532cde7cb01, StatelessResetToken: 0xfaf3fa59367a103806195c5db5538925} 2025/12/13 17:12:10 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:10 client <- &wire.NewTokenFrame{Token: 0x36a025835485ed883f15ba70dacd3ceafe37420dbe457485fa93d59dd328ee4643f7999e056f4b366d} 2025/12/13 17:12:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:10 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:10 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:10 client -> Sending packet 7 (49 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701550, LowestAcked: 5701546, DelayTime: 25.235205ms, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:10 client <- Reading packet 5701552 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5701552, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:10 client <- &wire.PingFrame{} 2025/12/13 17:12:10 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:10 client -> Sending packet 8 (50 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:10 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:10 client -> &wire.AckFrame{LargestAcked: 5701552, LowestAcked: 5701546, AckRanges: {{Largest: 5701552, Smallest: 5701552}, {Largest: 5701550, Smallest: 5701546}}, DelayTime: 68.538µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client <- Reading packet 5701553 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5701553, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.PingFrame{} 2025/12/13 17:12:11 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:11 client -> Sending packet 9 (1366 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.PingFrame{} 2025/12/13 17:12:11 client <- Reading packet 5701554 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5701554, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:11 client -> Sending packet 10 (50 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 5701554, LowestAcked: 5701546, AckRanges: {{Largest: 5701554, Smallest: 5701552}, {Largest: 5701550, Smallest: 5701546}}, DelayTime: 57.938µs, ECT0: 9, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:11 client -> Sending packet 11 (40 bytes) for connection 0739fb651fb44de289733644adc07afd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: 3f7ef875ec977f3e3b00e5928259e43ffba5, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:11 client Connection 0739fb651fb44de289733644adc07afd closed. 2025/12/13 17:12:11 Requesting https://server4:443/frightened-arctic-phone. 2025/12/13 17:12:11 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:11 Increased send buffer size to 14336 kiB 2025/12/13 17:12:11 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:11 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:11 Created qlog file: /logs/qlog/51bec2d5bf49414960ff2351664c88ae6a6832.sqlog 2025/12/13 17:12:11 client Starting new connection to server4 ([::]:47483 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 51bec2d5bf49414960ff2351664c88ae6a6832, version v1 2025/12/13 17:12:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:11 client -> Sending packet 0 (1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 51bec2d5bf49414960ff2351664c88ae6a6832, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:11 client -> Sending packet 1 (1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 51bec2d5bf49414960ff2351664c88ae6a6832, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client updated RTT: 33.25358ms (σ: 16.62679ms) 2025/12/13 17:12:11 client <- Received Retry: 2025/12/13 17:12:11 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 00ea8aa50fe08893530196d2b73d8c69f6e2, Token: 0xb7d1fc6e5fbc390ac30a160fa94613169d2d6945712cea3b78a5ecb51a4c4166964d5f5469f333311ccedd04be219d337d357507a777ed65967798efadc3f9f83093dc7a4f6bab78d42dbf03ce7bacb527804fb426667d81305d, Version: v1} 2025/12/13 17:12:11 client Switching destination connection ID to: 00ea8aa50fe08893530196d2b73d8c69f6e2 2025/12/13 17:12:11 client -> Sending packet 2 (1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 00ea8aa50fe08893530196d2b73d8c69f6e2, SrcConnectionID: (empty), Token: 0xb7d1fc6e5fbc390ac30a160fa94613169d2d6945712cea3b78a5ecb51a4c4166964d5f5469f333311ccedd04be219d337d357507a777ed65967798efadc3f9f83093dc7a4f6bab78d42dbf03ce7bacb527804fb426667d81305d, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:11 client -> Sending packet 3 (1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 00ea8aa50fe08893530196d2b73d8c69f6e2, SrcConnectionID: (empty), Token: 0xb7d1fc6e5fbc390ac30a160fa94613169d2d6945712cea3b78a5ecb51a4c4166964d5f5469f333311ccedd04be219d337d357507a777ed65967798efadc3f9f83093dc7a4f6bab78d42dbf03ce7bacb527804fb426667d81305d, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1139, Data length: 90, Offset + Data length: 1229} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client <- Reading packet 2040586243 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81, Token: (empty), PacketNumber: 2040586243, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:11 client Received first packet. Switching destination connection ID to: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81 2025/12/13 17:12:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:11 client newly acked packets (1): [2] 2025/12/13 17:12:11 client updated RTT: 33.137ms (σ: 12.7ms) 2025/12/13 17:12:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:11 client -> Sending packet 4 (1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81, SrcConnectionID: (empty), Token: 0xb7d1fc6e5fbc390ac30a160fa94613169d2d6945712cea3b78a5ecb51a4c4166964d5f5469f333311ccedd04be219d337d357507a777ed65967798efadc3f9f83093dc7a4f6bab78d42dbf03ce7bacb527804fb426667d81305d, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1139, Data length: 90, Offset + Data length: 1229} 2025/12/13 17:12:11 client -> Sending packet 5 (1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81, SrcConnectionID: (empty), Token: 0xb7d1fc6e5fbc390ac30a160fa94613169d2d6945712cea3b78a5ecb51a4c4166964d5f5469f333311ccedd04be219d337d357507a777ed65967798efadc3f9f83093dc7a4f6bab78d42dbf03ce7bacb527804fb426667d81305d, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1139, Data length: 90, Offset + Data length: 1229} 2025/12/13 17:12:11 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:11 client <- Reading packet 2040586244 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81, Token: (empty), PacketNumber: 2040586244, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Parsed a coalesced packet. Part 2: 789 bytes. Remaining: 260 bytes. 2025/12/13 17:12:11 client <- Reading packet 2040586243 (789 bytes) for connection (empty), Handshake 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81, PacketNumber: 2040586243, PacketNumberLen: 4, Length: 760, Version: v1} 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/12/13 17:12:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 51bec2d5bf49414960ff2351664c88ae6a6832, InitialSourceConnectionID: 7c4dd2252c4ae9dee7c33f2b111b9aff4e81, RetrySourceConnectionID: 00ea8aa50fe08893530196d2b73d8c69f6e2, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x95b054a0b1d0bc07c8f32753b0c55fd5, EnableResetStreamAt: false} 2025/12/13 17:12:11 client <- Reading packet 2040586243 (260 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2040586243, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 902969e8cc27d56ac25330546cc6525a123c, StatelessResetToken: 0x1f8cf2950986327b50bf275ca8fb0e45} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 37b4e3cf44026b66043372d34d2d238dea63, StatelessResetToken: 0x761d655889a3e75961d5daf6961606bf} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, StatelessResetToken: 0x08d5bd084b82e7e3e5ce463a00bdf0bb} 2025/12/13 17:12:11 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, SrcConnectionID: (empty), Token: 0xb7d1fc6e5fbc390ac30a160fa94613169d2d6945712cea3b78a5ecb51a4c4166964d5f5469f333311ccedd04be219d337d357507a777ed65967798efadc3f9f83093dc7a4f6bab78d42dbf03ce7bacb527804fb426667d81305d, PacketNumber: 6, PacketNumberLen: 2, Length: 975, Version: v1} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 2040586244, LowestAcked: 2040586243, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 2040586243, LowestAcked: 2040586243, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:11 client Short Header{DestConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 2040586243, LowestAcked: 2040586243, DelayTime: 781.057µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 17:12:11 client Dropping Initial keys. 2025/12/13 17:12:11 client <- Reading packet 2040586245 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2040586245, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bcd26c7527e9a00b296aeb578674d89b453e, StatelessResetToken: 0x44728f22c17c5d365ed9c8d47cd45d30} 2025/12/13 17:12:11 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:11 client Dropping Handshake keys. 2025/12/13 17:12:11 client <- &wire.NewTokenFrame{Token: 0x3602f3809c454e2e0bf9289c6a1b8565a64215707cde895951e8141cabcd680d460792d7650bf0824e} 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:11 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/12/13 17:12:11 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:11 client -> Sending packet 1 (54 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 2040586245, LowestAcked: 2040586243, AckRanges: {{Largest: 2040586245, Smallest: 2040586245}, {Largest: 2040586243, Smallest: 2040586243}}, DelayTime: 88.355µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client <- Reading packet 2040586247 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2040586247, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 5.112ms} 2025/12/13 17:12:11 client newly acked packets (1): [0] 2025/12/13 17:12:11 client Ignoring all packets below 2040586244. 2025/12/13 17:12:11 client updated RTT: 33.61ms (σ: 10.472ms) 2025/12/13 17:12:11 client Canceling loss detection timer. 2025/12/13 17:12:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:11 client <- Reading packet 2040586248 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2040586248, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/12/13 17:12:11 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:11 client -> Sending packet 2 (54 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 2040586248, LowestAcked: 2040586245, AckRanges: {{Largest: 2040586248, Smallest: 2040586247}, {Largest: 2040586245, Smallest: 2040586245}}, DelayTime: 87.704µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:11 client -> Sending packet 3 (40 bytes) for connection 51bec2d5bf49414960ff2351664c88ae6a6832, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: ae3d7afc5948c3631cc64cf808ef60854bc8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:11 client Connection 51bec2d5bf49414960ff2351664c88ae6a6832 closed. 2025/12/13 17:12:11 Requesting https://server4:443/green-aquamarine-dvi. 2025/12/13 17:12:11 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:11 Increased send buffer size to 14336 kiB 2025/12/13 17:12:11 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:11 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:11 Created qlog file: /logs/qlog/b392c07464f550bb7b282da79ff5fb72da8437.sqlog 2025/12/13 17:12:11 client Starting new connection to server4 ([::]:56806 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b392c07464f550bb7b282da79ff5fb72da8437, version v1 2025/12/13 17:12:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:11 client -> Sending packet 0 (1280 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: b392c07464f550bb7b282da79ff5fb72da8437, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:11 client -> Sending packet 1 (1280 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: b392c07464f550bb7b282da79ff5fb72da8437, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1229, Data length: 276, Offset + Data length: 1505} 2025/12/13 17:12:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:11 client -> Sending packet 2 (1280 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: b392c07464f550bb7b282da79ff5fb72da8437, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:11 client -> Sending packet 3 (1280 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: b392c07464f550bb7b282da79ff5fb72da8437, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1229, Data length: 276, Offset + Data length: 1505} 2025/12/13 17:12:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:11 client <- Reading packet 978485036 (1200 bytes) for connection (empty), Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ab47a2c552de144f6a3fa2e23dc009fbc361, Token: (empty), PacketNumber: 978485036, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/12/13 17:12:11 client Received first packet. Switching destination connection ID to: ab47a2c552de144f6a3fa2e23dc009fbc361 2025/12/13 17:12:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:11 client newly acked packets (1): [2] 2025/12/13 17:12:11 client updated RTT: 32.747103ms (σ: 16.373551ms) 2025/12/13 17:12:11 client <- &wire.PingFrame{} 2025/12/13 17:12:11 client -> Sending packet 4 (1280 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: ab47a2c552de144f6a3fa2e23dc009fbc361, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 978485036, LowestAcked: 978485036, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:11 client <- Reading packet 978485037 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ab47a2c552de144f6a3fa2e23dc009fbc361, Token: (empty), PacketNumber: 978485037, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:11 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:11 client newly acked packets (1): [3] 2025/12/13 17:12:11 client updated RTT: 33.002ms (σ: 12.791ms) 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 280 bytes. 2025/12/13 17:12:11 client <- Reading packet 978485035 (769 bytes) for connection (empty), Handshake 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ab47a2c552de144f6a3fa2e23dc009fbc361, PacketNumber: 978485035, PacketNumberLen: 4, Length: 740, Version: v1} 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/12/13 17:12:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b392c07464f550bb7b282da79ff5fb72da8437, InitialSourceConnectionID: ab47a2c552de144f6a3fa2e23dc009fbc361, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd3bb1319a72dec887a0423b6f6828842, EnableResetStreamAt: false} 2025/12/13 17:12:11 client <- Reading packet 978485035 (280 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 978485035, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6cf3403d7d2660e05b76bb80b1393e8f16ee, StatelessResetToken: 0x33d20b6f6baac24e3a004572ccdbc458} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8d079af2a62142652ea769ff954485bee515, StatelessResetToken: 0x988717c84e853d2e6061b1c70e01942c} 2025/12/13 17:12:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, StatelessResetToken: 0x235ead787da689e114af36aa4d1e8229} 2025/12/13 17:12:11 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1107, Version: v1} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 978485037, LowestAcked: 978485036, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 978485035, LowestAcked: 978485035, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:11 client Short Header{DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 978485035, LowestAcked: 978485035, DelayTime: 504.922µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:11 client Dropping Initial keys. 2025/12/13 17:12:11 client -> Sending packet 1 (66 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:11 client -> Sending packet 1 (84 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Handshake 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:11 client -> Sending packet 2 (84 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Handshake 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:11 client Parsed a coalesced packet. Part 1: 141 bytes. Remaining: 1059 bytes. 2025/12/13 17:12:11 client Dropping initial packet (141 bytes) because we already dropped the keys. 2025/12/13 17:12:11 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 290 bytes. 2025/12/13 17:12:11 client <- Reading packet 978485036 (769 bytes) for connection (empty), Handshake 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ab47a2c552de144f6a3fa2e23dc009fbc361, PacketNumber: 978485036, PacketNumberLen: 4, Length: 740, Version: v1} 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/12/13 17:12:11 client <- Reading packet 978485036 (290 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 978485036, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:11 client -> Sending packet 3 (56 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, Handshake 2025/12/13 17:12:11 client Long Header{Type: Handshake, DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 29, Version: v1} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 978485036, LowestAcked: 978485035, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client <- Reading packet 978485038 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 978485038, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 84.072ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client Peer doesn't await address validation any longer. 2025/12/13 17:12:11 client newly acked packets (1): [1] 2025/12/13 17:12:11 client updated RTT: 40.458ms (σ: 24.505ms) 2025/12/13 17:12:11 client ECN capability confirmed. 2025/12/13 17:12:11 client lost packet 0 (time threshold) 2025/12/13 17:12:11 client Canceling loss detection timer. 2025/12/13 17:12:11 client Dropping Handshake keys. 2025/12/13 17:12:11 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:11 client <- &wire.NewTokenFrame{Token: 0x36d9b3a01f42ee5e69d37ac438a9ea437cbf1252e6b35e9f9e5fa1aa1564bbd0c8d96d2dbdc126b65a} 2025/12/13 17:12:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:11 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 881, Offset + Data length: 881} 2025/12/13 17:12:11 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:11 client -> Sending packet 2 (52 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.AckFrame{LargestAcked: 978485038, LowestAcked: 978485035, AckRanges: {{Largest: 978485038, Smallest: 978485038}, {Largest: 978485036, Smallest: 978485035}}, DelayTime: 173.602µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:11 client <- Reading packet 978485039 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:11 client Short Header{DestConnectionID: (empty), PacketNumber: 978485039, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 881, Data length: 143, Offset + Data length: 1024} 2025/12/13 17:12:11 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:11 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:11 client -> Sending packet 3 (40 bytes) for connection b392c07464f550bb7b282da79ff5fb72da8437, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:11 client Short Header{DestConnectionID: 891b21e7ad3043e06d090afb3374f270e73b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:11 client Connection b392c07464f550bb7b282da79ff5fb72da8437 closed. 2025/12/13 17:12:11 Requesting https://server4:443/guilty-sad-druid. 2025/12/13 17:12:11 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:11 Increased send buffer size to 14336 kiB 2025/12/13 17:12:11 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:11 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:11 Created qlog file: /logs/qlog/a24ebdeef9edee7b0fca5a6fed.sqlog 2025/12/13 17:12:11 client Starting new connection to server4 ([::]:54281 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a24ebdeef9edee7b0fca5a6fed, version v1 2025/12/13 17:12:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:11 client -> Sending packet 0 (1280 bytes) for connection a24ebdeef9edee7b0fca5a6fed, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: a24ebdeef9edee7b0fca5a6fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 17:12:11 client -> Sending packet 1 (1280 bytes) for connection a24ebdeef9edee7b0fca5a6fed, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: a24ebdeef9edee7b0fca5a6fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1235, Data length: 280, Offset + Data length: 1515} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:11 client -> Sending packet 2 (1280 bytes) for connection a24ebdeef9edee7b0fca5a6fed, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: a24ebdeef9edee7b0fca5a6fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 17:12:11 client -> Sending packet 3 (1280 bytes) for connection a24ebdeef9edee7b0fca5a6fed, Initial 2025/12/13 17:12:11 client Long Header{Type: Initial, DestConnectionID: a24ebdeef9edee7b0fca5a6fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:11 client -> &wire.CryptoFrame{Offset: 1235, Data length: 280, Offset + Data length: 1515} 2025/12/13 17:12:12 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:12 client <- Reading packet 1322708173 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, Token: (empty), PacketNumber: 1322708173, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:12 client Received first packet. Switching destination connection ID to: 229101922be96b56ffaec03ba73e6aa4cfd2 2025/12/13 17:12:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 293 bytes. 2025/12/13 17:12:12 client <- Reading packet 1322708172 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, PacketNumber: 1322708172, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a24ebdeef9edee7b0fca5a6fed, InitialSourceConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xf5d7eca6a74288f83ec7670b87d4f76d, EnableResetStreamAt: false} 2025/12/13 17:12:12 client <- Reading packet 1322708172 (293 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708172, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a24ebdeef9edee7b0fca5a6fed 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1153, Version: v1} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 1322708173, LowestAcked: 1322708173, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client Long Header{Type: Handshake, DestConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 1322708172, LowestAcked: 1322708172, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:12 client Dropping Initial keys. 2025/12/13 17:12:12 client -> Sending packet 0 (62 bytes) for connection a24ebdeef9edee7b0fca5a6fed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 23, Offset + Data length: 23} 2025/12/13 17:12:12 client <- Reading packet 1322708173 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708173, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.PingFrame{} 2025/12/13 17:12:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:12 client <- Reading packet 1322708176 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708176, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.792ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client Peer doesn't await address validation any longer. 2025/12/13 17:12:12 client newly acked packets (1): [0] 2025/12/13 17:12:12 client updated RTT: 36.927116ms (σ: 18.463558ms) 2025/12/13 17:12:12 client ECN capability confirmed. 2025/12/13 17:12:12 client Canceling loss detection timer. 2025/12/13 17:12:12 client Dropping Handshake keys. 2025/12/13 17:12:12 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:12 client -> Sending packet 1 (55 bytes) for connection a24ebdeef9edee7b0fca5a6fed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 1322708176, LowestAcked: 1322708172, AckRanges: {{Largest: 1322708176, Smallest: 1322708176}, {Largest: 1322708173, Smallest: 1322708172}}, DelayTime: 22.267342ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:12 client <- Reading packet 1322708177 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708177, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.PingFrame{} 2025/12/13 17:12:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:12 client <- Reading packet 1322708179 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708179, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 985, Data length: 39, Offset + Data length: 1024} 2025/12/13 17:12:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:12 client -> Sending packet 2 (56 bytes) for connection a24ebdeef9edee7b0fca5a6fed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 229101922be96b56ffaec03ba73e6aa4cfd2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 1322708179, LowestAcked: 1322708172, AckRanges: {{Largest: 1322708179, Smallest: 1322708179}, {Largest: 1322708177, Smallest: 1322708176}, {Largest: 1322708173, Smallest: 1322708172}}, DelayTime: 70.08µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client <- Reading packet 1322708180 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708180, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.PingFrame{} 2025/12/13 17:12:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:12 client <- Reading packet 1322708181 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1322708181, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6af3e3df3dec68ee482e5a8ee3a6b67f6fef, StatelessResetToken: 0x94cc5a41822b058d5850d67709753bf3} 2025/12/13 17:12:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77aa91a7a3bf3ddb7d24eac4cc28eb4bf854, StatelessResetToken: 0xa60880f93aa5570ffee2e6bc172f9c29} 2025/12/13 17:12:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8cb5dc5ab014039a96d046689495c25a3bbd, StatelessResetToken: 0x24970e84256d793cf76c14ae0fb4f732} 2025/12/13 17:12:12 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:12 client <- &wire.NewTokenFrame{Token: 0x36d290134b066aeb8e814032ff0a4b5cc67b74283dc76b9620d041df63597f8180f0f9f0af5a88aa80} 2025/12/13 17:12:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:12 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 985, Offset + Data length: 985} 2025/12/13 17:12:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:12 client -> Sending packet 3 (58 bytes) for connection a24ebdeef9edee7b0fca5a6fed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 8cb5dc5ab014039a96d046689495c25a3bbd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 1322708181, LowestAcked: 1322708172, AckRanges: {{Largest: 1322708181, Smallest: 1322708179}, {Largest: 1322708177, Smallest: 1322708176}, {Largest: 1322708173, Smallest: 1322708172}}, DelayTime: 111.238µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:12 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:12 client -> Sending packet 4 (40 bytes) for connection a24ebdeef9edee7b0fca5a6fed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 8cb5dc5ab014039a96d046689495c25a3bbd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:12 client Connection a24ebdeef9edee7b0fca5a6fed closed. 2025/12/13 17:12:12 Requesting https://server4:443/jubilant-teal-necromancer. 2025/12/13 17:12:12 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:12 Increased send buffer size to 14336 kiB 2025/12/13 17:12:12 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:12 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:12 Created qlog file: /logs/qlog/f6b6e8ab0cea0e99628fed01.sqlog 2025/12/13 17:12:12 client Starting new connection to server4 ([::]:33814 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f6b6e8ab0cea0e99628fed01, version v1 2025/12/13 17:12:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:12 client -> Sending packet 0 (1280 bytes) for connection f6b6e8ab0cea0e99628fed01, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: f6b6e8ab0cea0e99628fed01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 17:12:12 client -> Sending packet 1 (1280 bytes) for connection f6b6e8ab0cea0e99628fed01, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: f6b6e8ab0cea0e99628fed01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/12/13 17:12:12 client <- Reading packet 540220552 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6580f32eb594fd150d4e5702674d35580f7, Token: (empty), PacketNumber: 540220552, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:12 client Received first packet. Switching destination connection ID to: d6580f32eb594fd150d4e5702674d35580f7 2025/12/13 17:12:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:12 client newly acked packets (1): [0] 2025/12/13 17:12:12 client updated RTT: 32.275145ms (σ: 16.137572ms) 2025/12/13 17:12:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:12 client -> Sending packet 2 (1280 bytes) for connection f6b6e8ab0cea0e99628fed01, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/12/13 17:12:12 client -> Sending packet 3 (1280 bytes) for connection f6b6e8ab0cea0e99628fed01, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:12 client -> Sending packet 4 (1280 bytes) for connection f6b6e8ab0cea0e99628fed01, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:12 client -> Sending packet 5 (1280 bytes) for connection f6b6e8ab0cea0e99628fed01, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:12 client <- Reading packet 540220555 (59 bytes) for connection (empty), Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6580f32eb594fd150d4e5702674d35580f7, Token: (empty), PacketNumber: 540220555, PacketNumberLen: 4, Length: 29, Version: v1} 2025/12/13 17:12:12 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:12 client newly acked packets (1): [5] 2025/12/13 17:12:12 client updated RTT: 32.562ms (σ: 12.678ms) 2025/12/13 17:12:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:12 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:12 client <- Reading packet 540220556 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6580f32eb594fd150d4e5702674d35580f7, Token: (empty), PacketNumber: 540220556, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 295 bytes. 2025/12/13 17:12:12 client <- Reading packet 540220554 (761 bytes) for connection (empty), Handshake 2025/12/13 17:12:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d6580f32eb594fd150d4e5702674d35580f7, PacketNumber: 540220554, PacketNumberLen: 4, Length: 732, Version: v1} 2025/12/13 17:12:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/12/13 17:12:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f6b6e8ab0cea0e99628fed01, InitialSourceConnectionID: d6580f32eb594fd150d4e5702674d35580f7, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x88c250e1bbe949888734eec50f5a4909, EnableResetStreamAt: false} 2025/12/13 17:12:12 client <- Reading packet 540220554 (295 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 540220554, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.PingFrame{} 2025/12/13 17:12:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f6b6e8ab0cea0e99628fed01 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 540220556, LowestAcked: 540220552, AckRanges: {{Largest: 540220556, Smallest: 540220555}, {Largest: 540220552, Smallest: 540220552}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client Long Header{Type: Handshake, DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 540220554, LowestAcked: 540220554, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:12 client Dropping Initial keys. 2025/12/13 17:12:12 client -> Sending packet 0 (83 bytes) for connection f6b6e8ab0cea0e99628fed01, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 540220554, LowestAcked: 540220554, DelayTime: 800.613µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:12 client <- Reading packet 540220555 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 540220555, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.PingFrame{} 2025/12/13 17:12:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:12 client <- Reading packet 540220557 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 540220557, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 779, Data length: 245, Offset + Data length: 1024} 2025/12/13 17:12:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:12 client -> Sending packet 1 (50 bytes) for connection f6b6e8ab0cea0e99628fed01, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: d6580f32eb594fd150d4e5702674d35580f7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 540220557, LowestAcked: 540220554, AckRanges: {{Largest: 540220557, Smallest: 540220557}, {Largest: 540220555, Smallest: 540220554}}, DelayTime: 62.617µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client <- Reading packet 540220558 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 540220558, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.752ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client Peer doesn't await address validation any longer. 2025/12/13 17:12:12 client newly acked packets (1): [0] 2025/12/13 17:12:12 client Ignoring all packets below 540220555. 2025/12/13 17:12:12 client updated RTT: 33.09ms (σ: 10.566ms) 2025/12/13 17:12:12 client ECN capability confirmed. 2025/12/13 17:12:12 client Canceling loss detection timer. 2025/12/13 17:12:12 client Dropping Handshake keys. 2025/12/13 17:12:12 client <- Reading packet 540220559 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 540220559, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.PingFrame{} 2025/12/13 17:12:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:12 client <- Reading packet 540220560 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:12 client Short Header{DestConnectionID: (empty), PacketNumber: 540220560, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ad5f4dd8e90f1fda1e13deba6c7315488f8b, StatelessResetToken: 0x751270b75c40efb86cc2f8b104ad1ce0} 2025/12/13 17:12:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 88671d3533b3c773fc200a7dd4167ab180c7, StatelessResetToken: 0x9c86cb1af48e4aeeec745467d51311ef} 2025/12/13 17:12:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36fb3f38bef8d9764ccb8b07a3c833ef44a4, StatelessResetToken: 0xaa16d8cd84f431b47ed846a7314f678f} 2025/12/13 17:12:12 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:12 client <- &wire.NewTokenFrame{Token: 0x36acc6daf65c8d5e09d3de154ed81e365f6d6c715643bf88051ea6eef6d506b29e2e81e082594e0e2a} 2025/12/13 17:12:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:12 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 779, Offset + Data length: 779} 2025/12/13 17:12:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:12 client -> Sending packet 2 (52 bytes) for connection f6b6e8ab0cea0e99628fed01, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 36fb3f38bef8d9764ccb8b07a3c833ef44a4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.AckFrame{LargestAcked: 540220560, LowestAcked: 540220555, AckRanges: {{Largest: 540220560, Smallest: 540220557}, {Largest: 540220555, Smallest: 540220555}}, DelayTime: 168.556µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:12 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:12 client -> Sending packet 3 (40 bytes) for connection f6b6e8ab0cea0e99628fed01, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:12 client Short Header{DestConnectionID: 36fb3f38bef8d9764ccb8b07a3c833ef44a4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:12 client Connection f6b6e8ab0cea0e99628fed01 closed. 2025/12/13 17:12:12 Requesting https://server4:443/abundant-rough-artist. 2025/12/13 17:12:12 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:12 Increased send buffer size to 14336 kiB 2025/12/13 17:12:12 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:12 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:12 Created qlog file: /logs/qlog/70570ef069312f929c8fa27388157d8e62.sqlog 2025/12/13 17:12:12 client Starting new connection to server4 ([::]:46809 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 70570ef069312f929c8fa27388157d8e62, version v1 2025/12/13 17:12:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:12 client -> Sending packet 0 (1280 bytes) for connection 70570ef069312f929c8fa27388157d8e62, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: 70570ef069312f929c8fa27388157d8e62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:12 client -> Sending packet 1 (1280 bytes) for connection 70570ef069312f929c8fa27388157d8e62, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: 70570ef069312f929c8fa27388157d8e62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/12/13 17:12:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:12 client -> Sending packet 2 (1280 bytes) for connection 70570ef069312f929c8fa27388157d8e62, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: 70570ef069312f929c8fa27388157d8e62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 17:12:12 client -> Sending packet 3 (1280 bytes) for connection 70570ef069312f929c8fa27388157d8e62, Initial 2025/12/13 17:12:12 client Long Header{Type: Initial, DestConnectionID: 70570ef069312f929c8fa27388157d8e62, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/12/13 17:12:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:13 client <- Reading packet 462802253 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51e18a2d96604a323218583d8264ffe65dba, Token: (empty), PacketNumber: 462802253, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:13 client Received first packet. Switching destination connection ID to: 51e18a2d96604a323218583d8264ffe65dba 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:13 client newly acked packets (1): [2] 2025/12/13 17:12:13 client updated RTT: 32.220831ms (σ: 16.110415ms) 2025/12/13 17:12:13 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:13 client <- Reading packet 462802254 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51e18a2d96604a323218583d8264ffe65dba, Token: (empty), PacketNumber: 462802254, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:13 client newly acked packets (1): [3] 2025/12/13 17:12:13 client updated RTT: 32.535ms (σ: 12.714ms) 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/12/13 17:12:13 client <- Reading packet 462802253 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 51e18a2d96604a323218583d8264ffe65dba, PacketNumber: 462802253, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 70570ef069312f929c8fa27388157d8e62, InitialSourceConnectionID: 51e18a2d96604a323218583d8264ffe65dba, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xae59d045c266b0dcc8d9f3cf36c0e188, EnableResetStreamAt: false} 2025/12/13 17:12:13 client <- Reading packet 462802253 (283 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 462802253, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 769acf72a145ef022f604be6cbba9830055e, StatelessResetToken: 0x3003c59eafbbd5a8b8a222ef57585f46} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5411ce047dfd8aeaa3047d2c4e093626adc, StatelessResetToken: 0xfcf85677ca8679e44a8c7589970325b9} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, StatelessResetToken: 0x8a17f4780fdd558c4297da5bb3408a75} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 70570ef069312f929c8fa27388157d8e62 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1076, Version: v1} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 462802254, LowestAcked: 462802253, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 462802253, LowestAcked: 462802253, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 462802253, LowestAcked: 462802253, DelayTime: 722.608µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:13 client Dropping Initial keys. 2025/12/13 17:12:13 client <- Reading packet 462802257 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 462802257, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.984ms} 2025/12/13 17:12:13 client Peer doesn't await address validation any longer. 2025/12/13 17:12:13 client newly acked packets (1): [0] 2025/12/13 17:12:13 client Ignoring all packets below 462802254. 2025/12/13 17:12:13 client updated RTT: 32.525ms (σ: 9.555ms) 2025/12/13 17:12:13 client Canceling loss detection timer. 2025/12/13 17:12:13 client Dropping Handshake keys. 2025/12/13 17:12:13 client <- Reading packet 462802258 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 462802258, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.PingFrame{} 2025/12/13 17:12:13 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:13 client -> Sending packet 1 (48 bytes) for connection 70570ef069312f929c8fa27388157d8e62, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 462802258, LowestAcked: 462802257, DelayTime: 86.591µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client <- Reading packet 462802259 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 462802259, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.PingFrame{} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:13 client -> Sending packet 2 (49 bytes) for connection 70570ef069312f929c8fa27388157d8e62, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 462802259, LowestAcked: 462802257, DelayTime: 25.22306ms, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client <- Reading packet 462802261 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 462802261, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: eb449b6946ddb788d69c9e93cfa1bbfb5ad9, StatelessResetToken: 0x4276406bf6662657ebb317b7ee007d24} 2025/12/13 17:12:13 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:13 client <- &wire.NewTokenFrame{Token: 0x362ebcf44f8c5c1cb77fab15c16e3c9f66930ab7c442d1e740523f54005b6c5a15657665bade33bd74} 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:13 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:13 client -> Sending packet 3 (1366 bytes) for connection 70570ef069312f929c8fa27388157d8e62, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.PingFrame{} 2025/12/13 17:12:13 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:13 client -> Sending packet 4 (40 bytes) for connection 70570ef069312f929c8fa27388157d8e62, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d37c9059093cf5a906d3cf6ea9853bf0df4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:13 client Connection 70570ef069312f929c8fa27388157d8e62 closed. 2025/12/13 17:12:13 Requesting https://server4:443/violet-salty-armadillo. 2025/12/13 17:12:13 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:13 Increased send buffer size to 14336 kiB 2025/12/13 17:12:13 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:13 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:13 Created qlog file: /logs/qlog/3d836d6c71f9f73c5e0397df8363.sqlog 2025/12/13 17:12:13 client Starting new connection to server4 ([::]:35990 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3d836d6c71f9f73c5e0397df8363, version v1 2025/12/13 17:12:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:13 client -> Sending packet 0 (1280 bytes) for connection 3d836d6c71f9f73c5e0397df8363, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 3d836d6c71f9f73c5e0397df8363, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 17:12:13 client -> Sending packet 1 (1280 bytes) for connection 3d836d6c71f9f73c5e0397df8363, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 3d836d6c71f9f73c5e0397df8363, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 1234, Data length: 272, Offset + Data length: 1506} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:13 client <- Reading packet 301385635 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53af405fe6a950895a4ae1bcb309a76cd428, Token: (empty), PacketNumber: 301385635, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:13 client Received first packet. Switching destination connection ID to: 53af405fe6a950895a4ae1bcb309a76cd428 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:13 client newly acked packets (1): [0] 2025/12/13 17:12:13 client updated RTT: 32.33314ms (σ: 16.16657ms) 2025/12/13 17:12:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:13 client -> Sending packet 2 (1280 bytes) for connection 3d836d6c71f9f73c5e0397df8363, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 53af405fe6a950895a4ae1bcb309a76cd428, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 1234, Data length: 272, Offset + Data length: 1506} 2025/12/13 17:12:13 client -> Sending packet 3 (1280 bytes) for connection 3d836d6c71f9f73c5e0397df8363, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 53af405fe6a950895a4ae1bcb309a76cd428, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 1234, Data length: 272, Offset + Data length: 1506} 2025/12/13 17:12:13 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:13 client <- Reading packet 301385636 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53af405fe6a950895a4ae1bcb309a76cd428, Token: (empty), PacketNumber: 301385636, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:13 client newly acked packets (1): [3] 2025/12/13 17:12:13 client updated RTT: 32.531ms (σ: 12.522ms) 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 286 bytes. 2025/12/13 17:12:13 client <- Reading packet 301385635 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53af405fe6a950895a4ae1bcb309a76cd428, PacketNumber: 301385635, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3d836d6c71f9f73c5e0397df8363, InitialSourceConnectionID: 53af405fe6a950895a4ae1bcb309a76cd428, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xbdcc18fa641d9752d10a7b9c55e2435f, EnableResetStreamAt: false} 2025/12/13 17:12:13 client <- Reading packet 301385635 (286 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 301385635, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 65f642d95c8d3a9dd213741ac0b132a18845, StatelessResetToken: 0xb4532c3ccd99b958be4229a7b41dd3c3} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 86a4e39422bc411aedfc1af128ded8fc6f28, StatelessResetToken: 0xa4a8c6d499ce4c35eb452e734c28b2e8} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b0dd671363893c9582ac308fbea818baab26, StatelessResetToken: 0xe01ba9059d54bd2e032f799f3db86948} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3d836d6c71f9f73c5e0397df8363 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: b0dd671363893c9582ac308fbea818baab26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 301385636, LowestAcked: 301385635, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: b0dd671363893c9582ac308fbea818baab26, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 301385635, LowestAcked: 301385635, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 301385635, LowestAcked: 301385635, DelayTime: 596.022µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:13 client Dropping Initial keys. 2025/12/13 17:12:13 client -> Sending packet 1 (68 bytes) for connection 3d836d6c71f9f73c5e0397df8363, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:13 client <- Reading packet 301385636 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 301385636, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.PingFrame{} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client <- Reading packet 301385637 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 301385637, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ce5aa2bc10075ee8981d6724b766adcf1371, StatelessResetToken: 0xc5772a9584497d844d077a63c3c4a736} 2025/12/13 17:12:13 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:13 client Dropping Handshake keys. 2025/12/13 17:12:13 client <- &wire.NewTokenFrame{Token: 0x36655dde625bcf3e3ffc128fdcb27364179524399930e0542e15acc5d2e19c8aab3ae4511a0f8126f5} 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:13 client -> Sending packet 2 (48 bytes) for connection 3d836d6c71f9f73c5e0397df8363, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 301385637, LowestAcked: 301385635, DelayTime: 94.276µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client <- Reading packet 301385638 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 301385638, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 5.072ms} 2025/12/13 17:12:13 client newly acked packets (1): [0] 2025/12/13 17:12:13 client Ignoring all packets below 301385636. 2025/12/13 17:12:13 client updated RTT: 33.073ms (σ: 10.476ms) 2025/12/13 17:12:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:13 client -> Sending packet 4 (68 bytes) for connection 3d836d6c71f9f73c5e0397df8363, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:13 client -> Sending packet 5 (68 bytes) for connection 3d836d6c71f9f73c5e0397df8363, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:13 client <- Reading packet 301385639 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 301385639, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.PingFrame{} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client <- Reading packet 301385640 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 301385640, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 160µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client newly acked packets (1): [5] 2025/12/13 17:12:13 client updated RTT: 32.923ms (σ: 8.155ms) 2025/12/13 17:12:13 client ECN capability confirmed. 2025/12/13 17:12:13 client Canceling loss detection timer. 2025/12/13 17:12:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:13 client -> Sending packet 6 (48 bytes) for connection 3d836d6c71f9f73c5e0397df8363, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 301385640, LowestAcked: 301385636, DelayTime: 88.435µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:13 client -> Sending packet 7 (40 bytes) for connection 3d836d6c71f9f73c5e0397df8363, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: b0dd671363893c9582ac308fbea818baab26, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:13 client Connection 3d836d6c71f9f73c5e0397df8363 closed. 2025/12/13 17:12:13 Requesting https://server4:443/lively-few-necromancer. 2025/12/13 17:12:13 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:13 Increased send buffer size to 14336 kiB 2025/12/13 17:12:13 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:13 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:13 Created qlog file: /logs/qlog/ced6758e689cae174c37e1786127.sqlog 2025/12/13 17:12:13 client Starting new connection to server4 ([::]:42314 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ced6758e689cae174c37e1786127, version v1 2025/12/13 17:12:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:13 client -> Sending packet 0 (1280 bytes) for connection ced6758e689cae174c37e1786127, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: ced6758e689cae174c37e1786127, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 17:12:13 client -> Sending packet 1 (1280 bytes) for connection ced6758e689cae174c37e1786127, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: ced6758e689cae174c37e1786127, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 1234, Data length: 281, Offset + Data length: 1515} 2025/12/13 17:12:13 client <- Reading packet 178884339 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5926bcf8f10873804fd5bcf4fa042e46c989, Token: (empty), PacketNumber: 178884339, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:13 client Received first packet. Switching destination connection ID to: 5926bcf8f10873804fd5bcf4fa042e46c989 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:13 client newly acked packets (1): [0] 2025/12/13 17:12:13 client updated RTT: 32.104312ms (σ: 16.052156ms) 2025/12/13 17:12:13 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:13 client <- Reading packet 178884340 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5926bcf8f10873804fd5bcf4fa042e46c989, Token: (empty), PacketNumber: 178884340, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:13 client newly acked packets (1): [1] 2025/12/13 17:12:13 client updated RTT: 32.406ms (σ: 12.643ms) 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Parsed a coalesced packet. Part 2: 764 bytes. Remaining: 287 bytes. 2025/12/13 17:12:13 client <- Reading packet 178884339 (764 bytes) for connection (empty), Handshake 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5926bcf8f10873804fd5bcf4fa042e46c989, PacketNumber: 178884339, PacketNumberLen: 4, Length: 735, Version: v1} 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/12/13 17:12:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ced6758e689cae174c37e1786127, InitialSourceConnectionID: 5926bcf8f10873804fd5bcf4fa042e46c989, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x555fdaee95073eb63db4fab7f59c1bff, EnableResetStreamAt: false} 2025/12/13 17:12:13 client <- Reading packet 178884339 (287 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884339, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aa25b02531a976de153804f24218c841994d, StatelessResetToken: 0x6417f295de4bfc888b8a5e67d2138ca0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0d2da18c4e6b54a48a64f300d240214ae6cf, StatelessResetToken: 0xdc773e86e36f1ebe5e75e99cae71c6e5} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, StatelessResetToken: 0x8a86f56cb5748b3f1643058d4cc2788d} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ced6758e689cae174c37e1786127 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 178884340, LowestAcked: 178884339, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 178884339, LowestAcked: 178884339, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 178884339, LowestAcked: 178884339, DelayTime: 625.988µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:13 client Dropping Initial keys. 2025/12/13 17:12:13 client -> Sending packet 1 (68 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:13 client -> Sending packet 1 (84 bytes) for connection ced6758e689cae174c37e1786127, Handshake 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:13 client -> Sending packet 2 (84 bytes) for connection ced6758e689cae174c37e1786127, Handshake 2025/12/13 17:12:13 client Long Header{Type: Handshake, DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:13 client <- Reading packet 178884340 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884340, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.PingFrame{} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client <- Reading packet 178884341 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884341, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:13 client Dropping Handshake keys. 2025/12/13 17:12:13 client <- &wire.NewTokenFrame{Token: 0x36d9a5a55062686399cefaa64c723ea97bdb84fbfb3e944f6efe2683db2570e37247e33065297b3c91} 2025/12/13 17:12:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:13 client -> Sending packet 3 (50 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 178884341, LowestAcked: 178884339, DelayTime: 90.66µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:13 client Skipping packet number 2 2025/12/13 17:12:13 client -> Sending packet 4 (68 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:13 client <- Reading packet 178884343 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884343, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 13.432ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client newly acked packets (1): [4] 2025/12/13 17:12:13 client updated RTT: 33.876ms (σ: 12.422ms) 2025/12/13 17:12:13 client ECN capability confirmed. 2025/12/13 17:12:13 client setting loss timer for packet 3 (1-RTT) to 49.687079ms (in %!s(monotime.Time=3604236175543)) 2025/12/13 17:12:13 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3604236175543) 2025/12/13 17:12:13 client lost packet 3 (time threshold) 2025/12/13 17:12:13 client Canceling loss detection timer. 2025/12/13 17:12:13 client -> Sending packet 5 (39 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:13 client <- Reading packet 178884344 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884344, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ddbcfc3d21771e0f6bd5c87cdab02c1dff4b, StatelessResetToken: 0x1d0230b17ea0001a4c0e2d41da5ea9c6} 2025/12/13 17:12:13 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:13 client -> Sending packet 6 (50 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 178884344, LowestAcked: 178884339, AckRanges: {{Largest: 178884344, Smallest: 178884343}, {Largest: 178884341, Smallest: 178884339}}, DelayTime: 90.689µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client <- Reading packet 178884345 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884345, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 13.376ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client newly acked packets (1): [5] 2025/12/13 17:12:13 client updated RTT: 35.148ms (σ: 11.862ms) 2025/12/13 17:12:13 client Canceling loss detection timer. 2025/12/13 17:12:13 client <- Reading packet 178884346 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884346, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.PingFrame{} 2025/12/13 17:12:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:13 client <- Reading packet 178884347 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:13 client Short Header{DestConnectionID: (empty), PacketNumber: 178884347, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:13 client -> Sending packet 7 (50 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.AckFrame{LargestAcked: 178884347, LowestAcked: 178884339, AckRanges: {{Largest: 178884347, Smallest: 178884343}, {Largest: 178884341, Smallest: 178884339}}, DelayTime: 62.697µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:13 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:13 client -> Sending packet 8 (40 bytes) for connection ced6758e689cae174c37e1786127, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:13 client Short Header{DestConnectionID: 8d644f2a4c0eee48f73ff69cbc1f2668fa1d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:13 client Connection ced6758e689cae174c37e1786127 closed. 2025/12/13 17:12:13 Requesting https://server4:443/few-worried-cat. 2025/12/13 17:12:13 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:13 Increased send buffer size to 14336 kiB 2025/12/13 17:12:13 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:13 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:13 Created qlog file: /logs/qlog/3cc603717ba95987c6.sqlog 2025/12/13 17:12:13 client Starting new connection to server4 ([::]:56661 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3cc603717ba95987c6, version v1 2025/12/13 17:12:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:13 client -> Sending packet 0 (1280 bytes) for connection 3cc603717ba95987c6, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 3cc603717ba95987c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:12:13 client -> Sending packet 1 (1280 bytes) for connection 3cc603717ba95987c6, Initial 2025/12/13 17:12:13 client Long Header{Type: Initial, DestConnectionID: 3cc603717ba95987c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:13 client -> &wire.CryptoFrame{Offset: 1239, Data length: 274, Offset + Data length: 1513} 2025/12/13 17:12:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:14 client -> Sending packet 2 (1280 bytes) for connection 3cc603717ba95987c6, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 3cc603717ba95987c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:12:14 client -> Sending packet 3 (1280 bytes) for connection 3cc603717ba95987c6, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 3cc603717ba95987c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 1239, Data length: 274, Offset + Data length: 1513} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:14 client -> Sending packet 4 (1280 bytes) for connection 3cc603717ba95987c6, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 3cc603717ba95987c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:14 client -> Sending packet 5 (1280 bytes) for connection 3cc603717ba95987c6, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 3cc603717ba95987c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 1239, Data length: 274, Offset + Data length: 1513} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:14 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:14 client <- Reading packet 1192181795 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fbba9d2272b5d75ede09eadfc8291ea720e, Token: (empty), PacketNumber: 1192181795, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:14 client Received first packet. Switching destination connection ID to: 7fbba9d2272b5d75ede09eadfc8291ea720e 2025/12/13 17:12:14 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:14 client newly acked packets (1): [5] 2025/12/13 17:12:14 client updated RTT: 34.666143ms (σ: 17.333071ms) 2025/12/13 17:12:14 client setting loss timer for packet 4 (Initial) to 38.99941ms (in %!s(monotime.Time=3604943062478)) 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 290 bytes. 2025/12/13 17:12:14 client <- Reading packet 1192181794 (759 bytes) for connection (empty), Handshake 2025/12/13 17:12:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7fbba9d2272b5d75ede09eadfc8291ea720e, PacketNumber: 1192181794, PacketNumberLen: 4, Length: 730, Version: v1} 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/12/13 17:12:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3cc603717ba95987c6, InitialSourceConnectionID: 7fbba9d2272b5d75ede09eadfc8291ea720e, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x32af2f133365d558db071226a2bd1c91, EnableResetStreamAt: false} 2025/12/13 17:12:14 client <- Reading packet 1192181794 (290 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1192181794, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 13eb1ef8dc68f2627bf0508768e715720677, StatelessResetToken: 0xe53e2af637be021b74ec1d7055ab0df0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d4630445d6b2a4c5ceb74121291af0a20c5, StatelessResetToken: 0xdf7502040a7fa88ad25359e90bdf860b} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 57ff897ab3a6174b39df0a2f5f352e8033cc, StatelessResetToken: 0xdb1409b09d887cfab80759ad03847619} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3cc603717ba95987c6 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 57ff897ab3a6174b39df0a2f5f352e8033cc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1074, Version: v1} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1192181795, LowestAcked: 1192181795, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client Long Header{Type: Handshake, DestConnectionID: 57ff897ab3a6174b39df0a2f5f352e8033cc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1192181794, LowestAcked: 1192181794, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:14 client Short Header{DestConnectionID: 57ff897ab3a6174b39df0a2f5f352e8033cc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1192181794, LowestAcked: 1192181794, DelayTime: 764.094µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 17:12:14 client Dropping Initial keys. 2025/12/13 17:12:14 client <- Reading packet 1192181795 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1192181795, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.PingFrame{} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client <- Reading packet 1192181796 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1192181796, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fc1e8c5cd17ccefc25849355502e213a3ff2, StatelessResetToken: 0x71bcb7e3232fa455b2656cb08a76c8a6} 2025/12/13 17:12:14 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:14 client Dropping Handshake keys. 2025/12/13 17:12:14 client <- &wire.NewTokenFrame{Token: 0x368081dd1a2f14556fd6ed98ab4732e7093ce33bfe087158b481e56b8f354cd3e7b875e2555c7e8fd0} 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/12/13 17:12:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:14 client -> Sending packet 1 (52 bytes) for connection 3cc603717ba95987c6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 57ff897ab3a6174b39df0a2f5f352e8033cc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1192181796, LowestAcked: 1192181794, DelayTime: 91.691µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client <- Reading packet 1192181797 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1192181797, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:14 client -> Sending packet 2 (40 bytes) for connection 3cc603717ba95987c6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 57ff897ab3a6174b39df0a2f5f352e8033cc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:14 client Connection 3cc603717ba95987c6 closed. 2025/12/13 17:12:14 Requesting https://server4:443/endless-jubilant-smartwatch. 2025/12/13 17:12:14 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:14 Increased send buffer size to 14336 kiB 2025/12/13 17:12:14 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:14 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:14 Created qlog file: /logs/qlog/27131551068053e7283f852b237b6ed5bee013da.sqlog 2025/12/13 17:12:14 client Starting new connection to server4 ([::]:33390 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 27131551068053e7283f852b237b6ed5bee013da, version v1 2025/12/13 17:12:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:14 client -> Sending packet 0 (1280 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 27131551068053e7283f852b237b6ed5bee013da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:14 client -> Sending packet 1 (1280 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 27131551068053e7283f852b237b6ed5bee013da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 1228, Data length: 280, Offset + Data length: 1508} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:14 client -> Sending packet 2 (1280 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 27131551068053e7283f852b237b6ed5bee013da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:14 client -> Sending packet 3 (1280 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 27131551068053e7283f852b237b6ed5bee013da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 1228, Data length: 280, Offset + Data length: 1508} 2025/12/13 17:12:14 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:14 client <- Reading packet 1913507587 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33128ea304e2a3ce8fb86160274f7fb09a87, Token: (empty), PacketNumber: 1913507587, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:14 client Received first packet. Switching destination connection ID to: 33128ea304e2a3ce8fb86160274f7fb09a87 2025/12/13 17:12:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:14 client newly acked packets (2): [2 3] 2025/12/13 17:12:14 client updated RTT: 34.574896ms (σ: 17.287448ms) 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Parsed a coalesced packet. Part 2: 771 bytes. Remaining: 280 bytes. 2025/12/13 17:12:14 client <- Reading packet 1913507586 (771 bytes) for connection (empty), Handshake 2025/12/13 17:12:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33128ea304e2a3ce8fb86160274f7fb09a87, PacketNumber: 1913507586, PacketNumberLen: 4, Length: 742, Version: v1} 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/12/13 17:12:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 27131551068053e7283f852b237b6ed5bee013da, InitialSourceConnectionID: 33128ea304e2a3ce8fb86160274f7fb09a87, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x59945bd933612958441c9f27685cc795, EnableResetStreamAt: false} 2025/12/13 17:12:14 client <- Reading packet 1913507586 (280 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1913507586, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f6216f1ce581c828f29205d0a740b46a6f1, StatelessResetToken: 0x2d5c3df4446fef95ca6454ec73bd00d2} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b154f74d1e8b801e26cc61f35e83319f75de, StatelessResetToken: 0xb9362af0551da88f5131fc05f94bab28} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, StatelessResetToken: 0x51dddb055b7f7fcd6e78e0964ede309e} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1062, Version: v1} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1913507587, LowestAcked: 1913507587, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client Long Header{Type: Handshake, DestConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1913507586, LowestAcked: 1913507586, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:14 client Short Header{DestConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1913507586, LowestAcked: 1913507586, DelayTime: 768.164µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 17:12:14 client Dropping Initial keys. 2025/12/13 17:12:14 client <- Reading packet 1913507587 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1913507587, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.PingFrame{} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client <- Reading packet 1913507590 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1913507590, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.904ms} 2025/12/13 17:12:14 client Peer doesn't await address validation any longer. 2025/12/13 17:12:14 client newly acked packets (1): [0] 2025/12/13 17:12:14 client Ignoring all packets below 1913507587. 2025/12/13 17:12:14 client updated RTT: 34.831ms (σ: 13.479ms) 2025/12/13 17:12:14 client Canceling loss detection timer. 2025/12/13 17:12:14 client Dropping Handshake keys. 2025/12/13 17:12:14 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:14 client -> Sending packet 1 (55 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1913507590, LowestAcked: 1913507587, AckRanges: {{Largest: 1913507590, Smallest: 1913507590}, {Largest: 1913507587, Smallest: 1913507587}}, DelayTime: 22.293942ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:14 client <- Reading packet 1913507591 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1913507591, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.PingFrame{} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client <- Reading packet 1913507592 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1913507592, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a05a3d44288319a88105ebb0d45fdc96a6c9, StatelessResetToken: 0x2340eada15ffeae8331c1d610e54a442} 2025/12/13 17:12:14 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:14 client <- &wire.NewTokenFrame{Token: 0x3697f509530ba2420eb45390bcafc5c13dc3daef2cb4a1f980eae1d3a9cbf78ed74c5ed73f11eb9b4e} 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:14 client -> Sending packet 2 (54 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1913507592, LowestAcked: 1913507587, AckRanges: {{Largest: 1913507592, Smallest: 1913507590}, {Largest: 1913507587, Smallest: 1913507587}}, DelayTime: 85.049µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:14 client -> Sending packet 3 (40 bytes) for connection 27131551068053e7283f852b237b6ed5bee013da, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 166c742338aba6c28bbfe2b0622e59896c0a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:14 client Connection 27131551068053e7283f852b237b6ed5bee013da closed. 2025/12/13 17:12:14 Requesting https://server4:443/bountiful-sharp-highlighter. 2025/12/13 17:12:14 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:14 Increased send buffer size to 14336 kiB 2025/12/13 17:12:14 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:14 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:14 Created qlog file: /logs/qlog/b9f281d4fdb786df55ff1246bd7833c4f2b1f5.sqlog 2025/12/13 17:12:14 client Starting new connection to server4 ([::]:55106 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b9f281d4fdb786df55ff1246bd7833c4f2b1f5, version v1 2025/12/13 17:12:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:14 client -> Sending packet 0 (1280 bytes) for connection b9f281d4fdb786df55ff1246bd7833c4f2b1f5, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: b9f281d4fdb786df55ff1246bd7833c4f2b1f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:14 client -> Sending packet 1 (1280 bytes) for connection b9f281d4fdb786df55ff1246bd7833c4f2b1f5, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: b9f281d4fdb786df55ff1246bd7833c4f2b1f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 1229, Data length: 280, Offset + Data length: 1509} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:14 client <- Reading packet 1329867650 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f42572e58235e16a0ac99cd5f2addab9bc5d, Token: (empty), PacketNumber: 1329867650, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:14 client Received first packet. Switching destination connection ID to: f42572e58235e16a0ac99cd5f2addab9bc5d 2025/12/13 17:12:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:14 client newly acked packets (1): [0] 2025/12/13 17:12:14 client updated RTT: 32.060091ms (σ: 16.030045ms) 2025/12/13 17:12:14 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:14 client <- Reading packet 1329867651 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f42572e58235e16a0ac99cd5f2addab9bc5d, Token: (empty), PacketNumber: 1329867651, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:14 client newly acked packets (1): [1] 2025/12/13 17:12:14 client updated RTT: 32.364ms (σ: 12.63ms) 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 282 bytes. 2025/12/13 17:12:14 client <- Reading packet 1329867650 (769 bytes) for connection (empty), Handshake 2025/12/13 17:12:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f42572e58235e16a0ac99cd5f2addab9bc5d, PacketNumber: 1329867650, PacketNumberLen: 4, Length: 740, Version: v1} 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/12/13 17:12:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b9f281d4fdb786df55ff1246bd7833c4f2b1f5, InitialSourceConnectionID: f42572e58235e16a0ac99cd5f2addab9bc5d, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x2f785791e031ebfbe01dd41cc3edf9e4, EnableResetStreamAt: false} 2025/12/13 17:12:14 client <- Reading packet 1329867650 (282 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1329867650, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8385f0ce0ac01d79e6c1cf1822bd88c2772f, StatelessResetToken: 0x5eb6d48ab6765e12c807bd40bc161d38} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 800c5f0bcc4f62320334d157aea6f1b02ce2, StatelessResetToken: 0xeb7dc30a872d20d52614063da5d36252} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1faf467c3e8f7ca02043607f5bc58647def8, StatelessResetToken: 0xac6468da6202f3f70d178d47457d17c5} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b9f281d4fdb786df55ff1246bd7833c4f2b1f5 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 1faf467c3e8f7ca02043607f5bc58647def8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1062, Version: v1} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1329867651, LowestAcked: 1329867650, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client Long Header{Type: Handshake, DestConnectionID: 1faf467c3e8f7ca02043607f5bc58647def8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1329867650, LowestAcked: 1329867650, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:14 client Short Header{DestConnectionID: 1faf467c3e8f7ca02043607f5bc58647def8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1329867650, LowestAcked: 1329867650, DelayTime: 718.171µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 17:12:14 client Dropping Initial keys. 2025/12/13 17:12:14 client <- Reading packet 1329867651 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1329867651, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.PingFrame{} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client <- Reading packet 1329867652 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1329867652, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 83df4cfced336eabf40ee51401659566c5ae, StatelessResetToken: 0x85de3120e60bf778bf52ea173c718a08} 2025/12/13 17:12:14 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:14 client Dropping Handshake keys. 2025/12/13 17:12:14 client <- &wire.NewTokenFrame{Token: 0x367fa7db37eb40f34dcb80757485097eb0350fc8803131feca2d68ebfbedc2d25bf25e14c228ebc308} 2025/12/13 17:12:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/12/13 17:12:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:14 client -> Sending packet 1 (52 bytes) for connection b9f281d4fdb786df55ff1246bd7833c4f2b1f5, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 1faf467c3e8f7ca02043607f5bc58647def8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.AckFrame{LargestAcked: 1329867652, LowestAcked: 1329867650, DelayTime: 91.55µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:14 client <- Reading packet 1329867653 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1329867653, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/12/13 17:12:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:14 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:14 client -> Sending packet 2 (40 bytes) for connection b9f281d4fdb786df55ff1246bd7833c4f2b1f5, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:14 client Short Header{DestConnectionID: 1faf467c3e8f7ca02043607f5bc58647def8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:14 client Connection b9f281d4fdb786df55ff1246bd7833c4f2b1f5 closed. 2025/12/13 17:12:14 Requesting https://server4:443/delighted-bored-suitcase. 2025/12/13 17:12:14 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:14 Increased send buffer size to 14336 kiB 2025/12/13 17:12:14 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:14 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:14 Created qlog file: /logs/qlog/97f216cc2a7c6d6896006f4c1db035.sqlog 2025/12/13 17:12:14 client Starting new connection to server4 ([::]:41961 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 97f216cc2a7c6d6896006f4c1db035, version v1 2025/12/13 17:12:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:14 client -> Sending packet 0 (1280 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 97f216cc2a7c6d6896006f4c1db035, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 17:12:14 client -> Sending packet 1 (1280 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: 97f216cc2a7c6d6896006f4c1db035, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/12/13 17:12:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:14 client <- Reading packet 695844447 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 782017ff053cf4f12fd9db824b5fc9fcdab8, Token: (empty), PacketNumber: 695844447, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:14 client Received first packet. Switching destination connection ID to: 782017ff053cf4f12fd9db824b5fc9fcdab8 2025/12/13 17:12:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:14 client newly acked packets (1): [0] 2025/12/13 17:12:14 client updated RTT: 32.065869ms (σ: 16.032934ms) 2025/12/13 17:12:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:15 client -> Sending packet 2 (1280 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 782017ff053cf4f12fd9db824b5fc9fcdab8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/12/13 17:12:15 client -> Sending packet 3 (1280 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 782017ff053cf4f12fd9db824b5fc9fcdab8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/12/13 17:12:15 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:15 client <- Reading packet 695844448 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 782017ff053cf4f12fd9db824b5fc9fcdab8, Token: (empty), PacketNumber: 695844448, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:15 client newly acked packets (1): [3] 2025/12/13 17:12:15 client updated RTT: 32.306ms (σ: 12.507ms) 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 284 bytes. 2025/12/13 17:12:15 client <- Reading packet 695844447 (765 bytes) for connection (empty), Handshake 2025/12/13 17:12:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 782017ff053cf4f12fd9db824b5fc9fcdab8, PacketNumber: 695844447, PacketNumberLen: 4, Length: 736, Version: v1} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/12/13 17:12:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 97f216cc2a7c6d6896006f4c1db035, InitialSourceConnectionID: 782017ff053cf4f12fd9db824b5fc9fcdab8, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x01895da1d1114f0feb85cbdadc726020, EnableResetStreamAt: false} 2025/12/13 17:12:15 client <- Reading packet 695844447 (284 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844447, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b922d48945218bb4d448be1c52969138077a, StatelessResetToken: 0x4e3ea6ab6bae305618ed927c0d98a84f} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 11171eb90236925d9f706f48bd7915cfb7e0, StatelessResetToken: 0x352b195819d951ee0f31a986f27fc7e2} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, StatelessResetToken: 0x800cd6ffa35f720324b5406778758de2} 2025/12/13 17:12:15 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 97f216cc2a7c6d6896006f4c1db035 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 695844448, LowestAcked: 695844447, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client Long Header{Type: Handshake, DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 695844447, LowestAcked: 695844447, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 695844447, LowestAcked: 695844447, DelayTime: 693.505µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:15 client Dropping Initial keys. 2025/12/13 17:12:15 client -> Sending packet 1 (70 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 17:12:15 client <- Reading packet 695844448 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844448, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.PingFrame{} 2025/12/13 17:12:15 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:15 client <- Reading packet 695844449 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844449, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 36826d5afbfa9faae93903b8434c6b2ac1bd, StatelessResetToken: 0xc952ced0a97e1d85372a55dad298f417} 2025/12/13 17:12:15 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:15 client Dropping Handshake keys. 2025/12/13 17:12:15 client <- &wire.NewTokenFrame{Token: 0x364db7a2680e15a7adf68a9889d0ae8b117b56f433021b47fe6ab604e5bd39c95f4b496478a49d2433} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:15 client -> Sending packet 2 (48 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 695844449, LowestAcked: 695844447, DelayTime: 83.736µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client <- Reading packet 695844450 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844450, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.992ms} 2025/12/13 17:12:15 client newly acked packets (1): [0] 2025/12/13 17:12:15 client Ignoring all packets below 695844448. 2025/12/13 17:12:15 client updated RTT: 32.872ms (σ: 10.513ms) 2025/12/13 17:12:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:15 client -> Sending packet 4 (70 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 17:12:15 client -> Sending packet 5 (70 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 17:12:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:15 client <- Reading packet 695844452 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844452, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 36826d5afbfa9faae93903b8434c6b2ac1bd, StatelessResetToken: 0xc952ced0a97e1d85372a55dad298f417} 2025/12/13 17:12:15 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:15 client <- &wire.NewTokenFrame{Token: 0x364db7a2680e15a7adf68a9889d0ae8b117b56f433021b47fe6ab604e5bd39c95f4b496478a49d2433} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:15 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:15 client -> Sending packet 6 (50 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 695844452, LowestAcked: 695844448, AckRanges: {{Largest: 695844452, Smallest: 695844452}, {Largest: 695844450, Smallest: 695844448}}, DelayTime: 84.848µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client <- Reading packet 695844453 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844453, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 36826d5afbfa9faae93903b8434c6b2ac1bd, StatelessResetToken: 0xc952ced0a97e1d85372a55dad298f417} 2025/12/13 17:12:15 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:15 client <- &wire.NewTokenFrame{Token: 0x364db7a2680e15a7adf68a9889d0ae8b117b56f433021b47fe6ab604e5bd39c95f4b496478a49d2433} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:15 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:15 client <- Reading packet 695844454 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 695844454, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 152µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client newly acked packets (1): [5] 2025/12/13 17:12:15 client updated RTT: 32.996ms (σ: 8.132ms) 2025/12/13 17:12:15 client ECN capability confirmed. 2025/12/13 17:12:15 client Canceling loss detection timer. 2025/12/13 17:12:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:15 client -> Sending packet 7 (50 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 695844454, LowestAcked: 695844448, AckRanges: {{Largest: 695844454, Smallest: 695844452}, {Largest: 695844450, Smallest: 695844448}}, DelayTime: 86.382µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:15 client -> Sending packet 8 (40 bytes) for connection 97f216cc2a7c6d6896006f4c1db035, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: e955b8d477928dee3e29c74e1bc57b87027a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:15 client Connection 97f216cc2a7c6d6896006f4c1db035 closed. 2025/12/13 17:12:15 Requesting https://server4:443/surplus-subtropical-chameleon. 2025/12/13 17:12:15 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:15 Increased send buffer size to 14336 kiB 2025/12/13 17:12:15 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:15 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:15 Created qlog file: /logs/qlog/25e85217d9993f46c9f49fe4b766.sqlog 2025/12/13 17:12:15 client Starting new connection to server4 ([::]:49451 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 25e85217d9993f46c9f49fe4b766, version v1 2025/12/13 17:12:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:15 client -> Sending packet 0 (1280 bytes) for connection 25e85217d9993f46c9f49fe4b766, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 25e85217d9993f46c9f49fe4b766, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 17:12:15 client -> Sending packet 1 (1280 bytes) for connection 25e85217d9993f46c9f49fe4b766, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 25e85217d9993f46c9f49fe4b766, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:15 client <- Reading packet 1329986057 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, Token: (empty), PacketNumber: 1329986057, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:15 client Received first packet. Switching destination connection ID to: 03b43a420ec9909e959cfab009ac065c1d44 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:15 client newly acked packets (1): [0] 2025/12/13 17:12:15 client updated RTT: 32.133268ms (σ: 16.066634ms) 2025/12/13 17:12:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:15 client -> Sending packet 2 (1280 bytes) for connection 25e85217d9993f46c9f49fe4b766, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/12/13 17:12:15 client -> Sending packet 3 (1280 bytes) for connection 25e85217d9993f46c9f49fe4b766, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/12/13 17:12:15 client <- Reading packet 1329986060 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, Token: (empty), PacketNumber: 1329986060, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:15 client newly acked packets (1): [3] 2025/12/13 17:12:15 client updated RTT: 32.209ms (σ: 12.203ms) 2025/12/13 17:12:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:15 client -> Sending packet 4 (1280 bytes) for connection 25e85217d9993f46c9f49fe4b766, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:15 client -> &wire.PingFrame{} 2025/12/13 17:12:15 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/12/13 17:12:15 client <- Reading packet 1329986061 (56 bytes) for connection (empty), Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, Token: (empty), PacketNumber: 1329986061, PacketNumberLen: 4, Length: 26, Version: v1} 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:15 client newly acked packets (1): [4] 2025/12/13 17:12:15 client updated RTT: 32.28ms (σ: 9.295ms) 2025/12/13 17:12:15 client <- &wire.PingFrame{} 2025/12/13 17:12:15 client Queueing packet (1144 bytes) for later decryption 2025/12/13 17:12:15 client -> Sending packet 5 (1280 bytes) for connection 25e85217d9993f46c9f49fe4b766, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986061, LowestAcked: 1329986057, AckRanges: {{Largest: 1329986061, Smallest: 1329986060}, {Largest: 1329986057, Smallest: 1329986057}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client Parsed a coalesced packet. Part 1: 141 bytes. Remaining: 1059 bytes. 2025/12/13 17:12:15 client <- Reading packet 1329986062 (141 bytes) for connection (empty), Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, Token: (empty), PacketNumber: 1329986062, PacketNumberLen: 1, Length: 111, Version: v1} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 296 bytes. 2025/12/13 17:12:15 client <- Reading packet 1329986059 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 1329986059, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 25e85217d9993f46c9f49fe4b766, InitialSourceConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xa3764f937844562782dd9bfa4505f768, EnableResetStreamAt: false} 2025/12/13 17:12:15 client <- Reading packet 1329986060 (296 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986060, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:15 client <- Reading packet 1329986060 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 1329986060, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 25e85217d9993f46c9f49fe4b766 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1153, Version: v1} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986062, LowestAcked: 1329986057, AckRanges: {{Largest: 1329986062, Smallest: 1329986060}, {Largest: 1329986057, Smallest: 1329986057}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client Long Header{Type: Handshake, DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986060, LowestAcked: 1329986059, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:15 client Dropping Initial keys. 2025/12/13 17:12:15 client <- Reading packet 1329986059 (1144 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986059, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.PingFrame{} 2025/12/13 17:12:15 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:15 client -> Sending packet 0 (91 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986060, LowestAcked: 1329986059, DelayTime: 721.677µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:15 client <- Reading packet 1329986061 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986061, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.PingFrame{} 2025/12/13 17:12:15 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:15 client <- Reading packet 1329986062 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986062, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:15 client Dropping Handshake keys. 2025/12/13 17:12:15 client <- &wire.NewTokenFrame{Token: 0x3659345dcfb8617f028b56dfaa32eb8112b787702e3bbf4a98d48801cad8ab012f4168bc84f161320b} 2025/12/13 17:12:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:15 client -> Sending packet 1 (52 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986062, LowestAcked: 1329986059, DelayTime: 75.682µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client <- Reading packet 1329986063 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986063, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.PingFrame{} 2025/12/13 17:12:15 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:15 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:15 client -> Sending packet 2 (53 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986063, LowestAcked: 1329986059, DelayTime: 25.319122ms, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:15 client -> Sending packet 4 (75 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:15 client -> Sending packet 5 (75 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:15 client <- Reading packet 1329986066 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986066, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 4.36ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client <- Reading packet 1329986067 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986067, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.PingFrame{} 2025/12/13 17:12:15 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:15 client -> Sending packet 6 (54 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: 03b43a420ec9909e959cfab009ac065c1d44, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986067, LowestAcked: 1329986059, AckRanges: {{Largest: 1329986067, Smallest: 1329986066}, {Largest: 1329986063, Smallest: 1329986059}}, DelayTime: 84.668µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client <- Reading packet 1329986069 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1329986069, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 68c7fb11ad1fc9b69b8b32566baf7849bd8d, StatelessResetToken: 0x6d16f4d8bf3bcea9b5f47d311bb44a7c} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e80a0c39b21794ca3efc0368834aa02269be, StatelessResetToken: 0x514c66bc11b0580ac191928141758983} 2025/12/13 17:12:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c5eae90fa9b84e0f7b1dd33be24dccc73794, StatelessResetToken: 0x04e8eb9a09677be7de7084fe248396c1} 2025/12/13 17:12:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:15 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:15 client -> Sending packet 7 (1366 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: c5eae90fa9b84e0f7b1dd33be24dccc73794, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.PingFrame{} 2025/12/13 17:12:15 client -> Sending packet 8 (58 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: c5eae90fa9b84e0f7b1dd33be24dccc73794, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.AckFrame{LargestAcked: 1329986069, LowestAcked: 1329986059, AckRanges: {{Largest: 1329986069, Smallest: 1329986069}, {Largest: 1329986067, Smallest: 1329986066}, {Largest: 1329986063, Smallest: 1329986059}}, DelayTime: 127.799µs, ECT0: 8, ECT1: 0, CE: 0} 2025/12/13 17:12:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:15 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:15 client -> Sending packet 9 (40 bytes) for connection 25e85217d9993f46c9f49fe4b766, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:15 client Short Header{DestConnectionID: c5eae90fa9b84e0f7b1dd33be24dccc73794, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:15 client Connection 25e85217d9993f46c9f49fe4b766 closed. 2025/12/13 17:12:15 Requesting https://server4:443/gigantic-sad-camera. 2025/12/13 17:12:15 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:15 Increased send buffer size to 14336 kiB 2025/12/13 17:12:15 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:15 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:15 Created qlog file: /logs/qlog/24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9.sqlog 2025/12/13 17:12:15 client Starting new connection to server4 ([::]:35003 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, version v1 2025/12/13 17:12:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:15 client -> Sending packet 0 (1280 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:15 client -> Sending packet 1 (1280 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, Initial 2025/12/13 17:12:15 client Long Header{Type: Initial, DestConnectionID: 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/12/13 17:12:15 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:16 client -> Sending packet 2 (1280 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> Sending packet 3 (1280 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/12/13 17:12:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:16 client <- Reading packet 354607721 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, Token: (empty), PacketNumber: 354607721, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:16 client Received first packet. Switching destination connection ID to: 7b3fcb8f1dfc3e75887705b4bebab61e4206 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [2] 2025/12/13 17:12:16 client updated RTT: 32.805994ms (σ: 16.402997ms) 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 281 bytes. 2025/12/13 17:12:16 client <- Reading packet 354607720 (770 bytes) for connection (empty), Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, PacketNumber: 354607720, PacketNumberLen: 4, Length: 741, Version: v1} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/12/13 17:12:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, InitialSourceConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x741dd9e9ff18b68a477325daeac97864, EnableResetStreamAt: false} 2025/12/13 17:12:16 client <- Reading packet 354607720 (281 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 354607720, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 354607721, LowestAcked: 354607721, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 354607720, LowestAcked: 354607720, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 client Dropping Initial keys. 2025/12/13 17:12:16 client -> Sending packet 0 (65 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 17:12:16 client <- Reading packet 354607721 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 354607721, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.PingFrame{} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client <- Reading packet 354607722 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 354607722, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:16 client Dropping Handshake keys. 2025/12/13 17:12:16 client <- &wire.NewTokenFrame{Token: 0x366dcaff4797ab28bb15a3d2a3b40ea5a27de24d700432f224d4e8111f974fd5aeab4f00eca3033881} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/12/13 17:12:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:16 client -> Sending packet 1 (48 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 354607722, LowestAcked: 354607720, DelayTime: 85.219µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client <- Reading packet 354607723 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 354607723, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:16 client -> Sending packet 2 (40 bytes) for connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 7b3fcb8f1dfc3e75887705b4bebab61e4206, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:16 client Connection 24120fc8c9bde1d0d4a8f4c22b4e126e38446ff9 closed. 2025/12/13 17:12:16 Requesting https://server4:443/boiling-lively-smartphone. 2025/12/13 17:12:16 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:16 Increased send buffer size to 14336 kiB 2025/12/13 17:12:16 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:16 Created qlog file: /logs/qlog/f6ae7d4b06ecc3a2b6570ab02aaf.sqlog 2025/12/13 17:12:16 client Starting new connection to server4 ([::]:39961 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f6ae7d4b06ecc3a2b6570ab02aaf, version v1 2025/12/13 17:12:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:16 client -> Sending packet 0 (1280 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: f6ae7d4b06ecc3a2b6570ab02aaf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 17:12:16 client -> Sending packet 1 (1280 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: f6ae7d4b06ecc3a2b6570ab02aaf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1234, Data length: 277, Offset + Data length: 1511} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client <- Reading packet 1491443919 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f5ff6fabf0a1cc97625285fb974eb20a70a, Token: (empty), PacketNumber: 1491443919, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:16 client Received first packet. Switching destination connection ID to: 7f5ff6fabf0a1cc97625285fb974eb20a70a 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [0] 2025/12/13 17:12:16 client updated RTT: 32.048859ms (σ: 16.024429ms) 2025/12/13 17:12:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:16 client -> Sending packet 2 (1280 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 7f5ff6fabf0a1cc97625285fb974eb20a70a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1234, Data length: 277, Offset + Data length: 1511} 2025/12/13 17:12:16 client -> Sending packet 3 (1280 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 7f5ff6fabf0a1cc97625285fb974eb20a70a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1234, Data length: 277, Offset + Data length: 1511} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:16 client <- Reading packet 1491443920 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f5ff6fabf0a1cc97625285fb974eb20a70a, Token: (empty), PacketNumber: 1491443920, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [3] 2025/12/13 17:12:16 client updated RTT: 32.294ms (σ: 12.51ms) 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 286 bytes. 2025/12/13 17:12:16 client <- Reading packet 1491443919 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7f5ff6fabf0a1cc97625285fb974eb20a70a, PacketNumber: 1491443919, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f6ae7d4b06ecc3a2b6570ab02aaf, InitialSourceConnectionID: 7f5ff6fabf0a1cc97625285fb974eb20a70a, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x83c75c9d99d96f8546dc140afd63abff, EnableResetStreamAt: false} 2025/12/13 17:12:16 client <- Reading packet 1491443919 (286 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1491443919, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a6a938211ee3143e8f11d8aa6b1e81996ed2, StatelessResetToken: 0xe58a25216d5c199ad22b51860b0e4811} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85c7e98005c9fb9d49893cb2f149e728c512, StatelessResetToken: 0x34e118283585f097a094641d082726cb} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 22720d8a2a2564e5582e7589f7f6d3663f97, StatelessResetToken: 0xde91696ed4404a579ba180670179ac10} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 22720d8a2a2564e5582e7589f7f6d3663f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1064, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1491443920, LowestAcked: 1491443919, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 22720d8a2a2564e5582e7589f7f6d3663f97, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1491443919, LowestAcked: 1491443919, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 client Short Header{DestConnectionID: 22720d8a2a2564e5582e7589f7f6d3663f97, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1491443919, LowestAcked: 1491443919, DelayTime: 837.553µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:16 client Dropping Initial keys. 2025/12/13 17:12:16 client <- Reading packet 1491443921 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1491443921, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a5b17061826a75259d23413092a5cb93e9b4, StatelessResetToken: 0x1049e473eb36aa55bf52654c6a5e8279} 2025/12/13 17:12:16 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:16 client Dropping Handshake keys. 2025/12/13 17:12:16 client <- &wire.NewTokenFrame{Token: 0x36dcc4ddb91a7e2e60be6d3fb55b1774c4c919795c6ed20df75d3fafe0fac764c20fcb16763732066f} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/12/13 17:12:16 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:16 client -> Sending packet 1 (54 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 22720d8a2a2564e5582e7589f7f6d3663f97, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1491443921, LowestAcked: 1491443919, AckRanges: {{Largest: 1491443921, Smallest: 1491443921}, {Largest: 1491443919, Smallest: 1491443919}}, DelayTime: 97.222µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client <- Reading packet 1491443922 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1491443922, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:16 client -> Sending packet 2 (40 bytes) for connection f6ae7d4b06ecc3a2b6570ab02aaf, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 22720d8a2a2564e5582e7589f7f6d3663f97, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:16 client Connection f6ae7d4b06ecc3a2b6570ab02aaf closed. 2025/12/13 17:12:16 Requesting https://server4:443/steaming-bountiful-glasses. 2025/12/13 17:12:16 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:16 Increased send buffer size to 14336 kiB 2025/12/13 17:12:16 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:16 Created qlog file: /logs/qlog/8068d71ebaad905aa39f90b5431a901775abee.sqlog 2025/12/13 17:12:16 client Starting new connection to server4 ([::]:40839 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8068d71ebaad905aa39f90b5431a901775abee, version v1 2025/12/13 17:12:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:16 client -> Sending packet 0 (1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 8068d71ebaad905aa39f90b5431a901775abee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:16 client -> Sending packet 1 (1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 8068d71ebaad905aa39f90b5431a901775abee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:16 client updated RTT: 33.234997ms (σ: 16.617498ms) 2025/12/13 17:12:16 client <- Received Retry: 2025/12/13 17:12:16 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 8116920c4a73a910ae22bf2340021359f23b, Token: 0xb75793ed5d3c2ec8f64fe53d799d700e22e40a4070422fc86f94641a0912addb40dee63a385088bfbc86082bca59b8d7d0428af096bbb993da021891a511dfad8bffe7d9961c07489cf872296798772cc6452d05b3068026cd92, Version: v1} 2025/12/13 17:12:16 client Switching destination connection ID to: 8116920c4a73a910ae22bf2340021359f23b 2025/12/13 17:12:16 client -> Sending packet 2 (1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 8116920c4a73a910ae22bf2340021359f23b, SrcConnectionID: (empty), Token: 0xb75793ed5d3c2ec8f64fe53d799d700e22e40a4070422fc86f94641a0912addb40dee63a385088bfbc86082bca59b8d7d0428af096bbb993da021891a511dfad8bffe7d9961c07489cf872296798772cc6452d05b3068026cd92, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:16 client -> Sending packet 3 (1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 8116920c4a73a910ae22bf2340021359f23b, SrcConnectionID: (empty), Token: 0xb75793ed5d3c2ec8f64fe53d799d700e22e40a4070422fc86f94641a0912addb40dee63a385088bfbc86082bca59b8d7d0428af096bbb993da021891a511dfad8bffe7d9961c07489cf872296798772cc6452d05b3068026cd92, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1139, Data length: 90, Offset + Data length: 1229} 2025/12/13 17:12:16 client <- Reading packet 1777725441 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19ca4d5bf384a4de2c21595466342f79cf32, Token: (empty), PacketNumber: 1777725441, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:16 client Received first packet. Switching destination connection ID to: 19ca4d5bf384a4de2c21595466342f79cf32 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [2] 2025/12/13 17:12:16 client updated RTT: 33.126ms (σ: 12.678ms) 2025/12/13 17:12:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:16 client -> Sending packet 4 (1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 19ca4d5bf384a4de2c21595466342f79cf32, SrcConnectionID: (empty), Token: 0xb75793ed5d3c2ec8f64fe53d799d700e22e40a4070422fc86f94641a0912addb40dee63a385088bfbc86082bca59b8d7d0428af096bbb993da021891a511dfad8bffe7d9961c07489cf872296798772cc6452d05b3068026cd92, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1139, Data length: 90, Offset + Data length: 1229} 2025/12/13 17:12:16 client -> Sending packet 5 (1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 19ca4d5bf384a4de2c21595466342f79cf32, SrcConnectionID: (empty), Token: 0xb75793ed5d3c2ec8f64fe53d799d700e22e40a4070422fc86f94641a0912addb40dee63a385088bfbc86082bca59b8d7d0428af096bbb993da021891a511dfad8bffe7d9961c07489cf872296798772cc6452d05b3068026cd92, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1139, Data length: 90, Offset + Data length: 1229} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:16 client <- Reading packet 1777725442 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19ca4d5bf384a4de2c21595466342f79cf32, Token: (empty), PacketNumber: 1777725442, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 2: 788 bytes. Remaining: 261 bytes. 2025/12/13 17:12:16 client <- Reading packet 1777725441 (788 bytes) for connection (empty), Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19ca4d5bf384a4de2c21595466342f79cf32, PacketNumber: 1777725441, PacketNumberLen: 4, Length: 759, Version: v1} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/12/13 17:12:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8068d71ebaad905aa39f90b5431a901775abee, InitialSourceConnectionID: 19ca4d5bf384a4de2c21595466342f79cf32, RetrySourceConnectionID: 8116920c4a73a910ae22bf2340021359f23b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xa7ba8ba727c57056de6ccf96c170d0a6, EnableResetStreamAt: false} 2025/12/13 17:12:16 client <- Reading packet 1777725441 (261 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1777725441, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7e328359e8266de95e1e38a31203b56b62d2, StatelessResetToken: 0xc7f59515ae07df32d6ba24d8756aee00} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 249e847a798fd15dd2a09772d3c8dd67c17e, StatelessResetToken: 0xac430208c2604623ded09ff3eeb80fe4} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, StatelessResetToken: 0x08bcdad2e689c25e2f8777c2f5f02ef9} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, SrcConnectionID: (empty), Token: 0xb75793ed5d3c2ec8f64fe53d799d700e22e40a4070422fc86f94641a0912addb40dee63a385088bfbc86082bca59b8d7d0428af096bbb993da021891a511dfad8bffe7d9961c07489cf872296798772cc6452d05b3068026cd92, PacketNumber: 6, PacketNumberLen: 2, Length: 972, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1777725442, LowestAcked: 1777725441, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1777725441, LowestAcked: 1777725441, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 client Short Header{DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1777725441, LowestAcked: 1777725441, DelayTime: 877.387µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:16 client Dropping Initial keys. 2025/12/13 17:12:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:16 client -> Sending packet 1 (84 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 client -> Sending packet 2 (84 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:16 client <- Reading packet 1777725442 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1777725442, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.PingFrame{} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client <- Reading packet 1777725443 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1777725443, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:16 client Dropping Handshake keys. 2025/12/13 17:12:16 client <- &wire.NewTokenFrame{Token: 0x368bea98a39fecbea29d3a378bdfd34a421635c513ce1b117f3784c5e425bff25d620e2b55eb74cef0} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:16 client -> Sending packet 2 (89 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1777725443, LowestAcked: 1777725441, DelayTime: 90.088µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:16 client -> Sending packet 3 (74 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:16 client <- Reading packet 1777725444 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1777725444, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.PingFrame{} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:16 client -> Sending packet 4 (53 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1777725444, LowestAcked: 1777725441, DelayTime: 25.318913ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client <- Reading packet 1777725446 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1777725446, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.PingFrame{} 2025/12/13 17:12:16 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:16 client -> Sending packet 5 (54 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1777725446, LowestAcked: 1777725441, AckRanges: {{Largest: 1777725446, Smallest: 1777725446}, {Largest: 1777725444, Smallest: 1777725441}}, DelayTime: 89.497µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client <- Reading packet 1777725447 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1777725447, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b04450517bbc8e37dc19f7349e4cde991a8a, StatelessResetToken: 0x943f6592bcdd16328b4a464f7c8543bd} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:16 client -> Sending packet 6 (40 bytes) for connection 8068d71ebaad905aa39f90b5431a901775abee, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 9326299702dfe53d8635e55d6db19dfddc0b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:16 client Connection 8068d71ebaad905aa39f90b5431a901775abee closed. 2025/12/13 17:12:16 Requesting https://server4:443/extreme-surplus-charmander. 2025/12/13 17:12:16 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:16 Increased send buffer size to 14336 kiB 2025/12/13 17:12:16 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:16 Created qlog file: /logs/qlog/4598ac2260b88249c1ac353fa40331692d68.sqlog 2025/12/13 17:12:16 client Starting new connection to server4 ([::]:46404 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4598ac2260b88249c1ac353fa40331692d68, version v1 2025/12/13 17:12:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:16 client -> Sending packet 0 (1280 bytes) for connection 4598ac2260b88249c1ac353fa40331692d68, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 4598ac2260b88249c1ac353fa40331692d68, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 17:12:16 client -> Sending packet 1 (1280 bytes) for connection 4598ac2260b88249c1ac353fa40331692d68, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 4598ac2260b88249c1ac353fa40331692d68, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1230, Data length: 284, Offset + Data length: 1514} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client <- Reading packet 54016960 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 54fd89c0b41655b6889f6eb61876e4677bc5, Token: (empty), PacketNumber: 54016960, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:16 client Received first packet. Switching destination connection ID to: 54fd89c0b41655b6889f6eb61876e4677bc5 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [0] 2025/12/13 17:12:16 client updated RTT: 32.11095ms (σ: 16.055475ms) 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:16 client <- Reading packet 54016961 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 54fd89c0b41655b6889f6eb61876e4677bc5, Token: (empty), PacketNumber: 54016961, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [1] 2025/12/13 17:12:16 client updated RTT: 32.44ms (σ: 12.702ms) 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 2: 769 bytes. Remaining: 282 bytes. 2025/12/13 17:12:16 client <- Reading packet 54016960 (769 bytes) for connection (empty), Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 54fd89c0b41655b6889f6eb61876e4677bc5, PacketNumber: 54016960, PacketNumberLen: 4, Length: 740, Version: v1} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/12/13 17:12:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4598ac2260b88249c1ac353fa40331692d68, InitialSourceConnectionID: 54fd89c0b41655b6889f6eb61876e4677bc5, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xf1c7165a6723c308ddd9799c94aec3f3, EnableResetStreamAt: false} 2025/12/13 17:12:16 client <- Reading packet 54016960 (282 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 54016960, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 95bb15193a5e573c0cc2b3f91aae3779a37e, StatelessResetToken: 0x9840437ea3d4d74de69e94d87c1381d9} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1c024e3c0b7dc6406640365eede08300ee4c, StatelessResetToken: 0xc6c19eb625f1f130a39f439ab932a08c} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1cddf87e61e1ee2f71964f36882f419f0884, StatelessResetToken: 0x373567400b592d75fc79b6451b41ae49} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4598ac2260b88249c1ac353fa40331692d68 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 1cddf87e61e1ee2f71964f36882f419f0884, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1071, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 54016961, LowestAcked: 54016960, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 1cddf87e61e1ee2f71964f36882f419f0884, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 54016960, LowestAcked: 54016960, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 client Short Header{DestConnectionID: 1cddf87e61e1ee2f71964f36882f419f0884, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 54016960, LowestAcked: 54016960, DelayTime: 1.335235ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:16 client Dropping Initial keys. 2025/12/13 17:12:16 client <- Reading packet 54016961 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 54016961, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.PingFrame{} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client <- Reading packet 54016962 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 54016962, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0739f99b4eb1eb0ea5e799f4f88f77ecf1db, StatelessResetToken: 0xd8a6797575aa03f61b7b3d7a1d3bd639} 2025/12/13 17:12:16 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:16 client Dropping Handshake keys. 2025/12/13 17:12:16 client <- &wire.NewTokenFrame{Token: 0x36216b28c8723551e1df40ae7f9cecb17f2efb4341469be2918287e01d6fdb4db7e82c5b0baacf3d1a} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/12/13 17:12:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:16 client -> Sending packet 1 (48 bytes) for connection 4598ac2260b88249c1ac353fa40331692d68, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 1cddf87e61e1ee2f71964f36882f419f0884, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 54016962, LowestAcked: 54016960, DelayTime: 153.096µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client <- Reading packet 54016963 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 54016963, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 855, Data length: 169, Offset + Data length: 1024} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:16 client -> Sending packet 2 (40 bytes) for connection 4598ac2260b88249c1ac353fa40331692d68, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 1cddf87e61e1ee2f71964f36882f419f0884, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:16 client Connection 4598ac2260b88249c1ac353fa40331692d68 closed. 2025/12/13 17:12:16 Requesting https://server4:443/ample-vibrant-lynx. 2025/12/13 17:12:16 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:16 Increased send buffer size to 14336 kiB 2025/12/13 17:12:16 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:16 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:16 Created qlog file: /logs/qlog/c63475e51bbdae7d8e7e5f0a8f20e6c5169d.sqlog 2025/12/13 17:12:16 client Starting new connection to server4 ([::]:57280 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c63475e51bbdae7d8e7e5f0a8f20e6c5169d, version v1 2025/12/13 17:12:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:16 client -> Sending packet 0 (1280 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: c63475e51bbdae7d8e7e5f0a8f20e6c5169d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 17:12:16 client -> Sending packet 1 (1280 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: c63475e51bbdae7d8e7e5f0a8f20e6c5169d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1230, Data length: 288, Offset + Data length: 1518} 2025/12/13 17:12:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:16 client -> Sending packet 2 (1280 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: c63475e51bbdae7d8e7e5f0a8f20e6c5169d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:16 client -> Sending packet 3 (1280 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: c63475e51bbdae7d8e7e5f0a8f20e6c5169d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 1230, Data length: 288, Offset + Data length: 1518} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:16 client <- Reading packet 1269359973 (1200 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5ab5c69987a56d1e4b891c3c03b61fbf90ab, Token: (empty), PacketNumber: 1269359973, PacketNumberLen: 4, Length: 1170, Version: v1} 2025/12/13 17:12:16 client Received first packet. Switching destination connection ID to: 5ab5c69987a56d1e4b891c3c03b61fbf90ab 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [2] 2025/12/13 17:12:16 client updated RTT: 32.837138ms (σ: 16.418569ms) 2025/12/13 17:12:16 client <- &wire.PingFrame{} 2025/12/13 17:12:16 client -> Sending packet 4 (1280 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 5ab5c69987a56d1e4b891c3c03b61fbf90ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1269359973, LowestAcked: 1269359973, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:16 client <- Reading packet 1269359974 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5ab5c69987a56d1e4b891c3c03b61fbf90ab, Token: (empty), PacketNumber: 1269359974, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:16 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:16 client newly acked packets (1): [3] 2025/12/13 17:12:16 client updated RTT: 33.073ms (σ: 12.786ms) 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 281 bytes. 2025/12/13 17:12:16 client <- Reading packet 1269359972 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5ab5c69987a56d1e4b891c3c03b61fbf90ab, PacketNumber: 1269359972, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c63475e51bbdae7d8e7e5f0a8f20e6c5169d, InitialSourceConnectionID: 5ab5c69987a56d1e4b891c3c03b61fbf90ab, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd26bf8e80fd8708a3df453fdc79f6ab9, EnableResetStreamAt: false} 2025/12/13 17:12:16 client <- Reading packet 1269359972 (281 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359972, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5992b58b88dbd518cb4a013c7f8ad3141907, StatelessResetToken: 0x966932aed331256ee19f6bbbd1722c73} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: defb8dce9e0d71a98e0ddcd1df5ba69247da, StatelessResetToken: 0x21b1a271e0e07b19fc24cdc25bb8dd41} 2025/12/13 17:12:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, StatelessResetToken: 0x8b6ed0bcaf82f578b168ffb4f7270c82} 2025/12/13 17:12:16 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d 2025/12/13 17:12:16 client Long Header{Type: Initial, DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1099, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1269359974, LowestAcked: 1269359973, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client Long Header{Type: Handshake, DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1269359972, LowestAcked: 1269359972, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:16 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.AckFrame{LargestAcked: 1269359972, LowestAcked: 1269359972, DelayTime: 511.284µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:16 client Dropping Initial keys. 2025/12/13 17:12:16 client -> Sending packet 1 (64 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:16 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 17:12:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:17 client -> Sending packet 1 (84 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client -> Sending packet 2 (84 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 1: 141 bytes. Remaining: 1059 bytes. 2025/12/13 17:12:17 client Dropping initial packet (141 bytes) because we already dropped the keys. 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 291 bytes. 2025/12/13 17:12:17 client <- Reading packet 1269359973 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5ab5c69987a56d1e4b891c3c03b61fbf90ab, PacketNumber: 1269359973, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:17 client <- Reading packet 1269359973 (291 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359973, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client -> Sending packet 3 (60 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1269359973, LowestAcked: 1269359972, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client <- Reading packet 1269359975 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359975, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:17 client Dropping Handshake keys. 2025/12/13 17:12:17 client <- &wire.NewTokenFrame{Token: 0x36e9001145818af823c6469368d71cde0cecabd97c6ce20efb762f7690a4d981b9c7c67ee77ba6cb27} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:17 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:17 client -> Sending packet 3 (56 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1269359975, LowestAcked: 1269359972, AckRanges: {{Largest: 1269359975, Smallest: 1269359975}, {Largest: 1269359973, Smallest: 1269359972}}, DelayTime: 76.613µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:17 client Skipping packet number 2 2025/12/13 17:12:17 client -> Sending packet 4 (64 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 17:12:17 client <- Reading packet 1269359977 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359977, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5992b58b88dbd518cb4a013c7f8ad3141907, StatelessResetToken: 0x966932aed331256ee19f6bbbd1722c73} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: defb8dce9e0d71a98e0ddcd1df5ba69247da, StatelessResetToken: 0x21b1a271e0e07b19fc24cdc25bb8dd41} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, StatelessResetToken: 0x8b6ed0bcaf82f578b168ffb4f7270c82} 2025/12/13 17:12:17 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:17 client -> Sending packet 5 (56 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1269359977, LowestAcked: 1269359972, AckRanges: {{Largest: 1269359977, Smallest: 1269359977}, {Largest: 1269359975, Smallest: 1269359975}, {Largest: 1269359973, Smallest: 1269359972}}, DelayTime: 77.234µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client <- Reading packet 1269359978 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359978, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:17 client <- &wire.NewTokenFrame{Token: 0x36e9001145818af823c6469368d71cde0cecabd97c6ce20efb762f7690a4d981b9c7c67ee77ba6cb27} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:17 client -> Sending packet 6 (57 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1269359978, LowestAcked: 1269359972, AckRanges: {{Largest: 1269359978, Smallest: 1269359977}, {Largest: 1269359975, Smallest: 1269359975}, {Largest: 1269359973, Smallest: 1269359972}}, DelayTime: 25.343281ms, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/12/13 17:12:17 client -> Sending packet 8 (39 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:17 client Skipping packet number 7 2025/12/13 17:12:17 client -> Sending packet 9 (64 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 17:12:17 client -> Sending packet 10 (1366 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.PingFrame{} 2025/12/13 17:12:17 client <- Reading packet 1269359979 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359979, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.PingFrame{} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client <- Reading packet 1269359980 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1269359980, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 136µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client newly acked packets (2): [8 9] 2025/12/13 17:12:17 client updated RTT: 32.932ms (σ: 9.87ms) 2025/12/13 17:12:17 client ECN capability confirmed. 2025/12/13 17:12:17 client Canceling loss detection timer. 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fc2059f2e55b0793946ba6556017dcccca43, StatelessResetToken: 0x8862d89c8765240c24e35f6d338ecf18} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:17 client -> Sending packet 11 (56 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1269359980, LowestAcked: 1269359972, AckRanges: {{Largest: 1269359980, Smallest: 1269359977}, {Largest: 1269359975, Smallest: 1269359975}, {Largest: 1269359973, Smallest: 1269359972}}, DelayTime: 123.441µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:17 client -> Sending packet 12 (40 bytes) for connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 0c3eb8c142d190729eed99d4ad53ac856a8d, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:17 client Connection c63475e51bbdae7d8e7e5f0a8f20e6c5169d closed. 2025/12/13 17:12:17 Requesting https://server4:443/black-bored-shorts. 2025/12/13 17:12:17 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:17 Increased send buffer size to 14336 kiB 2025/12/13 17:12:17 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:17 Created qlog file: /logs/qlog/d8f62cb41f9336544c68a1793178bc92.sqlog 2025/12/13 17:12:17 client Starting new connection to server4 ([::]:60701 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8f62cb41f9336544c68a1793178bc92, version v1 2025/12/13 17:12:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:17 client -> Sending packet 0 (1280 bytes) for connection d8f62cb41f9336544c68a1793178bc92, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: d8f62cb41f9336544c68a1793178bc92, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:17 client -> Sending packet 1 (1280 bytes) for connection d8f62cb41f9336544c68a1793178bc92, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: d8f62cb41f9336544c68a1793178bc92, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 17:12:17 client <- Reading packet 1161343166 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b562b0d13399d0cd5bea7dce7801c2c52fe, Token: (empty), PacketNumber: 1161343166, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:17 client Received first packet. Switching destination connection ID to: 0b562b0d13399d0cd5bea7dce7801c2c52fe 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:17 client newly acked packets (1): [0] 2025/12/13 17:12:17 client updated RTT: 32.138761ms (σ: 16.06938ms) 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:17 client <- Reading packet 1161343167 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b562b0d13399d0cd5bea7dce7801c2c52fe, Token: (empty), PacketNumber: 1161343167, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:17 client newly acked packets (1): [1] 2025/12/13 17:12:17 client updated RTT: 32.457ms (σ: 12.691ms) 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 285 bytes. 2025/12/13 17:12:17 client <- Reading packet 1161343166 (766 bytes) for connection (empty), Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b562b0d13399d0cd5bea7dce7801c2c52fe, PacketNumber: 1161343166, PacketNumberLen: 4, Length: 737, Version: v1} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/12/13 17:12:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8f62cb41f9336544c68a1793178bc92, InitialSourceConnectionID: 0b562b0d13399d0cd5bea7dce7801c2c52fe, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x2745e40d7541c6e5fb06589fb6e89d3a, EnableResetStreamAt: false} 2025/12/13 17:12:17 client <- Reading packet 1161343166 (285 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1161343166, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 320db05fc67844fdb66f9c6f02cdc9bccb0f, StatelessResetToken: 0x28d5574b24f7f6c1843d80f68f6de3f0} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dd97794b8b6454a37272e59014e25504e392, StatelessResetToken: 0xe16a9035cb31d6f585213931d26491fb} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, StatelessResetToken: 0x40eec034a8a6a1a05f1d120818247b6d} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8f62cb41f9336544c68a1793178bc92 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1161343167, LowestAcked: 1161343166, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1161343166, LowestAcked: 1161343166, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client Short Header{DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1161343166, LowestAcked: 1161343166, DelayTime: 666.063µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:17 client Dropping Initial keys. 2025/12/13 17:12:17 client -> Sending packet 1 (64 bytes) for connection d8f62cb41f9336544c68a1793178bc92, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 17:12:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:17 client -> Sending packet 1 (84 bytes) for connection d8f62cb41f9336544c68a1793178bc92, Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client -> Sending packet 2 (84 bytes) for connection d8f62cb41f9336544c68a1793178bc92, Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client <- Reading packet 1161343167 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1161343167, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.PingFrame{} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client <- Reading packet 1161343168 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1161343168, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.12ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Peer doesn't await address validation any longer. 2025/12/13 17:12:17 client newly acked packets (1): [1] 2025/12/13 17:12:17 client updated RTT: 39.875ms (σ: 24.355ms) 2025/12/13 17:12:17 client ECN capability confirmed. 2025/12/13 17:12:17 client lost packet 0 (time threshold) 2025/12/13 17:12:17 client Canceling loss detection timer. 2025/12/13 17:12:17 client Dropping Handshake keys. 2025/12/13 17:12:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:17 client <- &wire.NewTokenFrame{Token: 0x36eaea778ff7387580a6ddca8f3757f6c56dbcce034f2c534759b6468ce26d0670a0a1861b9d159cb2} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 881, Offset + Data length: 881} 2025/12/13 17:12:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:17 client -> Sending packet 2 (54 bytes) for connection d8f62cb41f9336544c68a1793178bc92, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1161343168, LowestAcked: 1161343166, DelayTime: 129.763µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:17 client <- Reading packet 1161343169 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1161343169, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 881, Data length: 143, Offset + Data length: 1024} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:17 client -> Sending packet 3 (40 bytes) for connection d8f62cb41f9336544c68a1793178bc92, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 5ccca5b06715b3d864cccc6cde08edfee5cb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:17 client Connection d8f62cb41f9336544c68a1793178bc92 closed. 2025/12/13 17:12:17 Requesting https://server4:443/roasting-small-programmer. 2025/12/13 17:12:17 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:17 Increased send buffer size to 14336 kiB 2025/12/13 17:12:17 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:17 Created qlog file: /logs/qlog/9d1c7b9584206718c8.sqlog 2025/12/13 17:12:17 client Starting new connection to server4 ([::]:57452 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9d1c7b9584206718c8, version v1 2025/12/13 17:12:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:17 client -> Sending packet 0 (1280 bytes) for connection 9d1c7b9584206718c8, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 9d1c7b9584206718c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:12:17 client -> Sending packet 1 (1280 bytes) for connection 9d1c7b9584206718c8, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 9d1c7b9584206718c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 1239, Data length: 269, Offset + Data length: 1508} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:17 client <- Reading packet 116236039 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74a2fda9eb0ece1c90db03394cc3bd023fe9, Token: (empty), PacketNumber: 116236039, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:17 client Received first packet. Switching destination connection ID to: 74a2fda9eb0ece1c90db03394cc3bd023fe9 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:17 client newly acked packets (1): [0] 2025/12/13 17:12:17 client updated RTT: 32.00773ms (σ: 16.003865ms) 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:17 client <- Reading packet 116236040 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74a2fda9eb0ece1c90db03394cc3bd023fe9, Token: (empty), PacketNumber: 116236040, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:17 client newly acked packets (1): [1] 2025/12/13 17:12:17 client updated RTT: 32.331ms (σ: 12.65ms) 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 293 bytes. 2025/12/13 17:12:17 client <- Reading packet 116236039 (758 bytes) for connection (empty), Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 74a2fda9eb0ece1c90db03394cc3bd023fe9, PacketNumber: 116236039, PacketNumberLen: 4, Length: 729, Version: v1} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/12/13 17:12:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9d1c7b9584206718c8, InitialSourceConnectionID: 74a2fda9eb0ece1c90db03394cc3bd023fe9, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xf358b7215cf318037b715670d39b8c9a, EnableResetStreamAt: false} 2025/12/13 17:12:17 client <- Reading packet 116236039 (293 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 116236039, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d50274f32ee264b34c66ed07aca8c2b56773, StatelessResetToken: 0x471ccc7d08dbd8146d8dd5a92765f734} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 38b6a5ce4ef8704c1bee7e75215f4e009982, StatelessResetToken: 0x1426cebdeb2b31646ed4084494d95bb4} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 10aa48ef2004aa20bf449febd160090ea336, StatelessResetToken: 0xaf2ff388106bab41687b49e31b443363} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9d1c7b9584206718c8 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 116236040, LowestAcked: 116236039, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 116236039, LowestAcked: 116236039, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client Short Header{DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 116236039, LowestAcked: 116236039, DelayTime: 521.824µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:17 client Dropping Initial keys. 2025/12/13 17:12:17 client -> Sending packet 1 (71 bytes) for connection 9d1c7b9584206718c8, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:17 client <- Reading packet 116236040 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 116236040, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.PingFrame{} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client <- Reading packet 116236041 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 116236041, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 448µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Peer doesn't await address validation any longer. 2025/12/13 17:12:17 client newly acked packets (2): [0 1] 2025/12/13 17:12:17 client Ignoring all packets below 116236040. 2025/12/13 17:12:17 client updated RTT: 32.746ms (σ: 10.318ms) 2025/12/13 17:12:17 client ECN capability confirmed. 2025/12/13 17:12:17 client Canceling loss detection timer. 2025/12/13 17:12:17 client Dropping Handshake keys. 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a0ebbab922be7c433beb245f3bb09436582e, StatelessResetToken: 0x4ad9db5967eaf7f52c64d927c862576f} 2025/12/13 17:12:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:17 client <- &wire.NewTokenFrame{Token: 0x36555f0822658639bee10c60b77072950a9f6f1177a2e1ddcf7e3563a23a7a8f6293f39ca2e1ea06a6} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:17 client -> Sending packet 2 (48 bytes) for connection 9d1c7b9584206718c8, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 116236041, LowestAcked: 116236040, DelayTime: 135.052µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client <- Reading packet 116236043 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 116236043, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.PingFrame{} 2025/12/13 17:12:17 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:17 client -> Sending packet 3 (50 bytes) for connection 9d1c7b9584206718c8, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 116236043, LowestAcked: 116236040, AckRanges: {{Largest: 116236043, Smallest: 116236043}, {Largest: 116236041, Smallest: 116236040}}, DelayTime: 85.51µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client <- Reading packet 116236044 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 116236044, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a0ebbab922be7c433beb245f3bb09436582e, StatelessResetToken: 0x4ad9db5967eaf7f52c64d927c862576f} 2025/12/13 17:12:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:17 client <- &wire.NewTokenFrame{Token: 0x36555f0822658639bee10c60b77072950a9f6f1177a2e1ddcf7e3563a23a7a8f6293f39ca2e1ea06a6} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client <- Reading packet 116236045 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 116236045, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:17 client -> Sending packet 4 (50 bytes) for connection 9d1c7b9584206718c8, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 116236045, LowestAcked: 116236040, AckRanges: {{Largest: 116236045, Smallest: 116236043}, {Largest: 116236041, Smallest: 116236040}}, DelayTime: 59.451µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:17 client -> Sending packet 5 (40 bytes) for connection 9d1c7b9584206718c8, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 10aa48ef2004aa20bf449febd160090ea336, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:17 client Connection 9d1c7b9584206718c8 closed. 2025/12/13 17:12:17 Requesting https://server4:443/gigantic-disgusted-rayquaza. 2025/12/13 17:12:17 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:17 Increased send buffer size to 14336 kiB 2025/12/13 17:12:17 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:17 Created qlog file: /logs/qlog/63922cf04c14cc025268a1910f0546243092b6.sqlog 2025/12/13 17:12:17 client Starting new connection to server4 ([::]:50421 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 63922cf04c14cc025268a1910f0546243092b6, version v1 2025/12/13 17:12:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:17 client -> Sending packet 0 (1280 bytes) for connection 63922cf04c14cc025268a1910f0546243092b6, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 63922cf04c14cc025268a1910f0546243092b6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:17 client -> Sending packet 1 (1280 bytes) for connection 63922cf04c14cc025268a1910f0546243092b6, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 63922cf04c14cc025268a1910f0546243092b6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 1229, Data length: 277, Offset + Data length: 1506} 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:17 client <- Reading packet 1383133299 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6a1bf6b3e053dd8593a8713c4a329f6cac03, Token: (empty), PacketNumber: 1383133299, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:17 client Received first packet. Switching destination connection ID to: 6a1bf6b3e053dd8593a8713c4a329f6cac03 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:17 client newly acked packets (2): [0 1] 2025/12/13 17:12:17 client updated RTT: 34.506255ms (σ: 17.253127ms) 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/12/13 17:12:17 client <- Reading packet 1383133298 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6a1bf6b3e053dd8593a8713c4a329f6cac03, PacketNumber: 1383133298, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 63922cf04c14cc025268a1910f0546243092b6, InitialSourceConnectionID: 6a1bf6b3e053dd8593a8713c4a329f6cac03, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xbc6c1bbf4514f7245e7f106400a766cb, EnableResetStreamAt: false} 2025/12/13 17:12:17 client <- Reading packet 1383133298 (283 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1383133298, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b3e7060b76407b2dfccb0997d3d70341cbe6, StatelessResetToken: 0x09767c1d921d31fdffd2c7c67112d048} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e3fb94b9b25fff0c82ba36e59512ef5c434, StatelessResetToken: 0x98526724e63d65ec29237d9695dd30c2} 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, StatelessResetToken: 0x98a0282c5fe122b8cf66390cb43f1c39} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 63922cf04c14cc025268a1910f0546243092b6 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1099, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1383133299, LowestAcked: 1383133299, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Long Header{Type: Handshake, DestConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1383133298, LowestAcked: 1383133298, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:17 client Short Header{DestConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1383133298, LowestAcked: 1383133298, DelayTime: 503.419µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:17 client Dropping Initial keys. 2025/12/13 17:12:17 client -> Sending packet 1 (73 bytes) for connection 63922cf04c14cc025268a1910f0546243092b6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 17:12:17 client <- Reading packet 1383133300 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1383133300, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 432µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client Peer doesn't await address validation any longer. 2025/12/13 17:12:17 client newly acked packets (2): [0 1] 2025/12/13 17:12:17 client Ignoring all packets below 1383133299. 2025/12/13 17:12:17 client updated RTT: 34.516ms (σ: 12.961ms) 2025/12/13 17:12:17 client ECN capability confirmed. 2025/12/13 17:12:17 client Canceling loss detection timer. 2025/12/13 17:12:17 client Dropping Handshake keys. 2025/12/13 17:12:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0774514587b453ce4f13f8918da4635316ea, StatelessResetToken: 0xd8f4194f85662bb17e7999df2f38b8ec} 2025/12/13 17:12:17 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:17 client <- &wire.NewTokenFrame{Token: 0x36e05e8d99170e0814263f1d1eee4e1cd30ab4db76ba4c61530aee7657cf20be9df546453d103a0b53} 2025/12/13 17:12:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:17 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:17 client -> Sending packet 2 (52 bytes) for connection 63922cf04c14cc025268a1910f0546243092b6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.AckFrame{LargestAcked: 1383133300, LowestAcked: 1383133300, DelayTime: 135.412µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:17 client <- Reading packet 1383133301 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1383133301, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:17 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:17 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:17 client -> Sending packet 3 (40 bytes) for connection 63922cf04c14cc025268a1910f0546243092b6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:17 client Short Header{DestConnectionID: 1a9aae54a86179ca72003fceccc1292d8dba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:17 client Connection 63922cf04c14cc025268a1910f0546243092b6 closed. 2025/12/13 17:12:17 Requesting https://server4:443/proud-excited-chef. 2025/12/13 17:12:17 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:17 Increased send buffer size to 14336 kiB 2025/12/13 17:12:17 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:17 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:17 Created qlog file: /logs/qlog/f62892c80e8535c5d141fba2229bce9a.sqlog 2025/12/13 17:12:17 client Starting new connection to server4 ([::]:54658 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f62892c80e8535c5d141fba2229bce9a, version v1 2025/12/13 17:12:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:17 client -> Sending packet 0 (1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: f62892c80e8535c5d141fba2229bce9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/12/13 17:12:17 client -> Sending packet 1 (1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: f62892c80e8535c5d141fba2229bce9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:17 client <- Reading packet 1270718738 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, Token: (empty), PacketNumber: 1270718738, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:17 client Received first packet. Switching destination connection ID to: 640c7cbbf7ae477b54610c42909aa7308d2b 2025/12/13 17:12:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:17 client newly acked packets (1): [0] 2025/12/13 17:12:17 client updated RTT: 32.064054ms (σ: 16.032027ms) 2025/12/13 17:12:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:17 client -> Sending packet 2 (1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:17 client -> Sending packet 3 (1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a, Initial 2025/12/13 17:12:17 client Long Header{Type: Initial, DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 17:12:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:18 client -> Sending packet 4 (1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> Sending packet 5 (1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/12/13 17:12:18 client <- Reading packet 1270718741 (57 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, Token: (empty), PacketNumber: 1270718741, PacketNumberLen: 4, Length: 27, Version: v1} 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:18 client <- Reading packet 1270718742 (57 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, Token: (empty), PacketNumber: 1270718742, PacketNumberLen: 4, Length: 27, Version: v1} 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:18 client newly acked packets (1): [5] 2025/12/13 17:12:18 client updated RTT: 32.16ms (σ: 12.217ms) 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:18 client <- Reading packet 1270718743 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, Token: (empty), PacketNumber: 1270718743, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 2: 766 bytes. Remaining: 290 bytes. 2025/12/13 17:12:18 client <- Reading packet 1270718740 (766 bytes) for connection (empty), Handshake 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, PacketNumber: 1270718740, PacketNumberLen: 4, Length: 737, Version: v1} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/12/13 17:12:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f62892c80e8535c5d141fba2229bce9a, InitialSourceConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x416a835908320ba447a4573ee4dcd93b, EnableResetStreamAt: false} 2025/12/13 17:12:18 client <- Reading packet 1270718740 (290 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1270718740, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f62892c80e8535c5d141fba2229bce9a 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1153, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1270718743, LowestAcked: 1270718738, AckRanges: {{Largest: 1270718743, Smallest: 1270718741}, {Largest: 1270718738, Smallest: 1270718738}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1270718740, LowestAcked: 1270718740, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:18 client Dropping Initial keys. 2025/12/13 17:12:18 client -> Sending packet 0 (80 bytes) for connection f62892c80e8535c5d141fba2229bce9a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 640c7cbbf7ae477b54610c42909aa7308d2b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1270718740, LowestAcked: 1270718740, DelayTime: 811.385µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 25, Offset + Data length: 25} 2025/12/13 17:12:18 client <- Reading packet 1270718742 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1270718742, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9a8158e24758e3629f4466f3f9cd9ec8635f, StatelessResetToken: 0x31c1721b1c678263edeb8da4c5fad7a2} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b25a6453366cdf0b7c8c842a41a90846032e, StatelessResetToken: 0x8b9870ea6d088cca30c4991145c096ee} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 73a067831009297e45637e1775bfb7ba7f8f, StatelessResetToken: 0xeb1d4ed3e5772006873078bdc7d38349} 2025/12/13 17:12:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:18 client Dropping Handshake keys. 2025/12/13 17:12:18 client <- &wire.NewTokenFrame{Token: 0x3658de34b45dfc14304d8da8e6607e7b350f308e4e028c5ebe222a5f1a4967a21995be256709af1f0d} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:18 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 779, Offset + Data length: 779} 2025/12/13 17:12:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:18 client -> Sending packet 1 (56 bytes) for connection f62892c80e8535c5d141fba2229bce9a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 73a067831009297e45637e1775bfb7ba7f8f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1270718742, LowestAcked: 1270718740, AckRanges: {{Largest: 1270718742, Smallest: 1270718742}, {Largest: 1270718740, Smallest: 1270718740}}, DelayTime: 107.811µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:18 client <- Reading packet 1270718743 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1270718743, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 779, Data length: 245, Offset + Data length: 1024} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:18 client -> Sending packet 2 (40 bytes) for connection f62892c80e8535c5d141fba2229bce9a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 73a067831009297e45637e1775bfb7ba7f8f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:18 client Connection f62892c80e8535c5d141fba2229bce9a closed. 2025/12/13 17:12:18 Requesting https://server4:443/unforgiving-turquoise-ethernet. 2025/12/13 17:12:18 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:18 Increased send buffer size to 14336 kiB 2025/12/13 17:12:18 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:18 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:18 Created qlog file: /logs/qlog/8e3ade91ed891e7e1f19c8a2.sqlog 2025/12/13 17:12:18 client Starting new connection to server4 ([::]:52480 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8e3ade91ed891e7e1f19c8a2, version v1 2025/12/13 17:12:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:18 client -> Sending packet 0 (1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 8e3ade91ed891e7e1f19c8a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:18 client -> Sending packet 1 (1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 8e3ade91ed891e7e1f19c8a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/12/13 17:12:18 client <- Reading packet 558750484 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, Token: (empty), PacketNumber: 558750484, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:18 client Received first packet. Switching destination connection ID to: 08eff3148c7696719cf9a8f49b741bae27d5 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:18 client newly acked packets (1): [0] 2025/12/13 17:12:18 client updated RTT: 32.029673ms (σ: 16.014836ms) 2025/12/13 17:12:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:18 client -> Sending packet 2 (1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> Sending packet 3 (1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:18 client -> Sending packet 4 (1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> Sending packet 5 (1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 1: 153 bytes. Remaining: 1047 bytes. 2025/12/13 17:12:18 client <- Reading packet 558750486 (153 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, Token: (empty), PacketNumber: 558750486, PacketNumberLen: 4, Length: 123, Version: v1} 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:18 client newly acked packets (1): [5] 2025/12/13 17:12:18 client updated RTT: 32.254ms (σ: 12.461ms) 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 2: 763 bytes. Remaining: 284 bytes. 2025/12/13 17:12:18 client <- Reading packet 558750485 (763 bytes) for connection (empty), Handshake 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, PacketNumber: 558750485, PacketNumberLen: 4, Length: 734, Version: v1} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/12/13 17:12:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8e3ade91ed891e7e1f19c8a2, InitialSourceConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x3116154d73695f853d3daa80255c2af6, EnableResetStreamAt: false} 2025/12/13 17:12:18 client <- Reading packet 558750485 (284 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 558750485, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8e3ade91ed891e7e1f19c8a2 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 558750486, LowestAcked: 558750484, AckRanges: {{Largest: 558750486, Smallest: 558750486}, {Largest: 558750484, Smallest: 558750484}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 558750485, LowestAcked: 558750485, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:18 client Dropping Initial keys. 2025/12/13 17:12:18 client -> Sending packet 0 (76 bytes) for connection 8e3ade91ed891e7e1f19c8a2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 37, Offset + Data length: 37} 2025/12/13 17:12:18 client <- Reading packet 558750486 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 558750486, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client <- Reading packet 558750487 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 558750487, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:18 client Dropping Handshake keys. 2025/12/13 17:12:18 client <- &wire.NewTokenFrame{Token: 0x36b85c5af9444d6b39fafd826de4dfe32e34c0d9b9549791228fb30832e94ab776fb10123cfbffe0a1} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:18 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/12/13 17:12:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:18 client -> Sending packet 1 (48 bytes) for connection 8e3ade91ed891e7e1f19c8a2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 558750487, LowestAcked: 558750485, DelayTime: 93.214µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client <- Reading packet 558750488 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 558750488, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:18 client -> Sending packet 2 (40 bytes) for connection 8e3ade91ed891e7e1f19c8a2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 08eff3148c7696719cf9a8f49b741bae27d5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:18 client Connection 8e3ade91ed891e7e1f19c8a2 closed. 2025/12/13 17:12:18 Requesting https://server4:443/bountiful-merciless-artist. 2025/12/13 17:12:18 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:18 Increased send buffer size to 14336 kiB 2025/12/13 17:12:18 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:18 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:18 Created qlog file: /logs/qlog/e165b76e0122624505c224ed.sqlog 2025/12/13 17:12:18 client Starting new connection to server4 ([::]:55178 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e165b76e0122624505c224ed, version v1 2025/12/13 17:12:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:18 client -> Sending packet 0 (1280 bytes) for connection e165b76e0122624505c224ed, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: e165b76e0122624505c224ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 17:12:18 client -> Sending packet 1 (1280 bytes) for connection e165b76e0122624505c224ed, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: e165b76e0122624505c224ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:18 client <- Reading packet 1373068369 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d590017a71b4b542c484e9bd557a9c4651c2, Token: (empty), PacketNumber: 1373068369, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:18 client Received first packet. Switching destination connection ID to: d590017a71b4b542c484e9bd557a9c4651c2 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:18 client newly acked packets (2): [0 1] 2025/12/13 17:12:18 client updated RTT: 34.495523ms (σ: 17.247761ms) 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 2: 762 bytes. Remaining: 289 bytes. 2025/12/13 17:12:18 client <- Reading packet 1373068368 (762 bytes) for connection (empty), Handshake 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d590017a71b4b542c484e9bd557a9c4651c2, PacketNumber: 1373068368, PacketNumberLen: 4, Length: 733, Version: v1} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/12/13 17:12:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e165b76e0122624505c224ed, InitialSourceConnectionID: d590017a71b4b542c484e9bd557a9c4651c2, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x80f7cfae5a83c15629ee7178f2175a05, EnableResetStreamAt: false} 2025/12/13 17:12:18 client <- Reading packet 1373068368 (289 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1373068368, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee8712a731313eed2e50f85f705635b8e9e2, StatelessResetToken: 0xb694d899bf111cc0290991aa5ce63ffe} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6cb0badb1c0b6299129c895872c6c57fd9ed, StatelessResetToken: 0xd7a0a0f5039315431c2a211be0d0e81c} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e31e28dab623949ccf53abe827b18340234e, StatelessResetToken: 0xace50098f32ee42d7899573c5ee44b91} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e165b76e0122624505c224ed 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: e31e28dab623949ccf53abe827b18340234e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1099, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1373068369, LowestAcked: 1373068369, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: e31e28dab623949ccf53abe827b18340234e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1373068368, LowestAcked: 1373068368, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:18 client Short Header{DestConnectionID: e31e28dab623949ccf53abe827b18340234e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1373068368, LowestAcked: 1373068368, DelayTime: 504.401µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:18 client Dropping Initial keys. 2025/12/13 17:12:18 client -> Sending packet 1 (72 bytes) for connection e165b76e0122624505c224ed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: e31e28dab623949ccf53abe827b18340234e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:18 client <- Reading packet 1373068369 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1373068369, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client <- Reading packet 1373068370 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1373068370, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 384µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client Peer doesn't await address validation any longer. 2025/12/13 17:12:18 client newly acked packets (2): [0 1] 2025/12/13 17:12:18 client Ignoring all packets below 1373068369. 2025/12/13 17:12:18 client updated RTT: 34.491ms (σ: 12.942ms) 2025/12/13 17:12:18 client ECN capability confirmed. 2025/12/13 17:12:18 client Canceling loss detection timer. 2025/12/13 17:12:18 client Dropping Handshake keys. 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d1af26951ebc1d9a4e6aba9ff1890cd9739a, StatelessResetToken: 0xd0fb6093a11badfd45780c8fbe7aaf23} 2025/12/13 17:12:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:18 client <- &wire.NewTokenFrame{Token: 0x36e7ac4eef2bd8e1ddb75eda9b22d7b5c995cba73f87a0b1fd3e2a01fab11152576e30a014c693a985} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:18 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:18 client -> Sending packet 2 (52 bytes) for connection e165b76e0122624505c224ed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: e31e28dab623949ccf53abe827b18340234e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1373068370, LowestAcked: 1373068369, DelayTime: 133.309µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client <- Reading packet 1373068372 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1373068372, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:18 client -> Sending packet 3 (54 bytes) for connection e165b76e0122624505c224ed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: e31e28dab623949ccf53abe827b18340234e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1373068372, LowestAcked: 1373068369, AckRanges: {{Largest: 1373068372, Smallest: 1373068372}, {Largest: 1373068370, Smallest: 1373068369}}, DelayTime: 66.373µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client <- Reading packet 1373068373 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1373068373, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:18 client -> Sending packet 4 (40 bytes) for connection e165b76e0122624505c224ed, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: e31e28dab623949ccf53abe827b18340234e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:18 client Connection e165b76e0122624505c224ed closed. 2025/12/13 17:12:18 Requesting https://server4:443/lonely-black-keyboard. 2025/12/13 17:12:18 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:18 Increased send buffer size to 14336 kiB 2025/12/13 17:12:18 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:18 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:18 Created qlog file: /logs/qlog/f70ac9971c5b899823e8542cf927480991885f25.sqlog 2025/12/13 17:12:18 client Starting new connection to server4 ([::]:58422 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f70ac9971c5b899823e8542cf927480991885f25, version v1 2025/12/13 17:12:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:18 client -> Sending packet 0 (1280 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: f70ac9971c5b899823e8542cf927480991885f25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 17:12:18 client -> Sending packet 1 (1280 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: f70ac9971c5b899823e8542cf927480991885f25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1228, Data length: 287, Offset + Data length: 1515} 2025/12/13 17:12:18 client updated RTT: 33.189123ms (σ: 16.594561ms) 2025/12/13 17:12:18 client <- Received Retry: 2025/12/13 17:12:18 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: d910be3207815e6b42266263737b903d63af, Token: 0xb75848bd765ec376f19fe8b580f36c04047a3b1dfd82f027347646efd0e0d519a3fb961e0b5060f9eb6a4e708cd83f6cb95e3bd9242d3afa0a5b8164dbf814dbb0bbcdb560cc519f6c74e5b5724002165528ad6bbe24e1ff8f60, Version: v1} 2025/12/13 17:12:18 client Switching destination connection ID to: d910be3207815e6b42266263737b903d63af 2025/12/13 17:12:18 client -> Sending packet 2 (1280 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: d910be3207815e6b42266263737b903d63af, SrcConnectionID: (empty), Token: 0xb75848bd765ec376f19fe8b580f36c04047a3b1dfd82f027347646efd0e0d519a3fb961e0b5060f9eb6a4e708cd83f6cb95e3bd9242d3afa0a5b8164dbf814dbb0bbcdb560cc519f6c74e5b5724002165528ad6bbe24e1ff8f60, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:18 client -> Sending packet 3 (1280 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: d910be3207815e6b42266263737b903d63af, SrcConnectionID: (empty), Token: 0xb75848bd765ec376f19fe8b580f36c04047a3b1dfd82f027347646efd0e0d519a3fb961e0b5060f9eb6a4e708cd83f6cb95e3bd9242d3afa0a5b8164dbf814dbb0bbcdb560cc519f6c74e5b5724002165528ad6bbe24e1ff8f60, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1139, Data length: 89, Offset + Data length: 1228} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 1228, Data length: 287, Offset + Data length: 1515} 2025/12/13 17:12:18 client <- Reading packet 1370681668 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0c53ddfe55263cdbe998e36fbe8facb7c83, Token: (empty), PacketNumber: 1370681668, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:18 client Received first packet. Switching destination connection ID to: f0c53ddfe55263cdbe998e36fbe8facb7c83 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:18 client newly acked packets (1): [2] 2025/12/13 17:12:18 client updated RTT: 33.117ms (σ: 12.588ms) 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:18 client <- Reading packet 1370681669 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0c53ddfe55263cdbe998e36fbe8facb7c83, Token: (empty), PacketNumber: 1370681669, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:18 client newly acked packets (1): [3] 2025/12/13 17:12:18 client updated RTT: 33.325ms (σ: 9.857ms) 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Parsed a coalesced packet. Part 2: 791 bytes. Remaining: 260 bytes. 2025/12/13 17:12:18 client <- Reading packet 1370681668 (791 bytes) for connection (empty), Handshake 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0c53ddfe55263cdbe998e36fbe8facb7c83, PacketNumber: 1370681668, PacketNumberLen: 4, Length: 762, Version: v1} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/12/13 17:12:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f70ac9971c5b899823e8542cf927480991885f25, InitialSourceConnectionID: f0c53ddfe55263cdbe998e36fbe8facb7c83, RetrySourceConnectionID: d910be3207815e6b42266263737b903d63af, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x2a512e101db2c3e4ccca550e1c1ad401, EnableResetStreamAt: false} 2025/12/13 17:12:18 client <- Reading packet 1370681668 (260 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681668, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684982ecc0e218187c2286ea5b20cc1139dd, StatelessResetToken: 0x36c0ae6c56d43a8f486561bcbf09fd33} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ba938f7da7497aa0ec21755c5d936986331b, StatelessResetToken: 0x70202e0b7a44942a54181efebe156247} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, StatelessResetToken: 0x6c2811c0e227e19669937722c7b3d9e9} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25 2025/12/13 17:12:18 client Long Header{Type: Initial, DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, SrcConnectionID: (empty), Token: 0xb75848bd765ec376f19fe8b580f36c04047a3b1dfd82f027347646efd0e0d519a3fb961e0b5060f9eb6a4e708cd83f6cb95e3bd9242d3afa0a5b8164dbf814dbb0bbcdb560cc519f6c74e5b5724002165528ad6bbe24e1ff8f60, PacketNumber: 4, PacketNumberLen: 2, Length: 1008, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1370681669, LowestAcked: 1370681668, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client Long Header{Type: Handshake, DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1370681668, LowestAcked: 1370681668, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:18 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1370681668, LowestAcked: 1370681668, DelayTime: 488.372µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:18 client Dropping Initial keys. 2025/12/13 17:12:18 client -> Sending packet 1 (67 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:18 client <- Reading packet 1370681669 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681669, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client <- Reading packet 1370681671 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681671, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.976ms} 2025/12/13 17:12:18 client Peer doesn't await address validation any longer. 2025/12/13 17:12:18 client newly acked packets (1): [0] 2025/12/13 17:12:18 client Ignoring all packets below 1370681669. 2025/12/13 17:12:18 client updated RTT: 33.755ms (σ: 8.254ms) 2025/12/13 17:12:18 client Dropping Handshake keys. 2025/12/13 17:12:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:18 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:18 client -> Sending packet 2 (55 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1370681671, LowestAcked: 1370681669, AckRanges: {{Largest: 1370681671, Smallest: 1370681671}, {Largest: 1370681669, Smallest: 1370681669}}, DelayTime: 22.308587ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client <- Reading packet 1370681672 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681672, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:18 client <- Reading packet 1370681673 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681673, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9bc1ac2220115e7214058a4691ef33e47cf4, StatelessResetToken: 0x92c9056ef6aaf6a1bf46991541192b22} 2025/12/13 17:12:18 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:18 client <- &wire.NewTokenFrame{Token: 0x3684370d6fd004538a386793d33ef97162d88f4b0917434b24bdcdfc027cce1c734df8544beaeec62a} 2025/12/13 17:12:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:18 client -> Sending packet 4 (84 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1370681673, LowestAcked: 1370681669, AckRanges: {{Largest: 1370681673, Smallest: 1370681671}, {Largest: 1370681669, Smallest: 1370681669}}, DelayTime: 93.705µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:18 client -> Sending packet 5 (67 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:18 client <- Reading packet 1370681676 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681676, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:18 client <- &wire.PingFrame{} 2025/12/13 17:12:18 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:18 client -> Sending packet 6 (56 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:18 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:18 client -> &wire.AckFrame{LargestAcked: 1370681676, LowestAcked: 1370681669, AckRanges: {{Largest: 1370681676, Smallest: 1370681676}, {Largest: 1370681673, Smallest: 1370681671}, {Largest: 1370681669, Smallest: 1370681669}}, DelayTime: 82.054µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/12/13 17:12:19 client -> Sending packet 8 (67 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:19 client -> Sending packet 9 (67 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:19 client -> Sending packet 10 (1366 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.PingFrame{} 2025/12/13 17:12:19 client <- Reading packet 1370681678 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681678, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9bc1ac2220115e7214058a4691ef33e47cf4, StatelessResetToken: 0x92c9056ef6aaf6a1bf46991541192b22} 2025/12/13 17:12:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:19 client <- &wire.NewTokenFrame{Token: 0x3684370d6fd004538a386793d33ef97162d88f4b0917434b24bdcdfc027cce1c734df8544beaeec62a} 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:19 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:19 client -> Sending packet 11 (58 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 1370681678, LowestAcked: 1370681669, AckRanges: {{Largest: 1370681678, Smallest: 1370681678}, {Largest: 1370681676, Smallest: 1370681676}, {Largest: 1370681673, Smallest: 1370681671}, {Largest: 1370681669, Smallest: 1370681669}}, DelayTime: 82.714µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client <- Reading packet 1370681680 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681680, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 64µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client newly acked packets (1): [9] 2025/12/13 17:12:19 client updated RTT: 33.401ms (σ: 6.897ms) 2025/12/13 17:12:19 client ECN capability confirmed. 2025/12/13 17:12:19 client Canceling loss detection timer. 2025/12/13 17:12:19 client <- Reading packet 1370681682 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681682, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9bc1ac2220115e7214058a4691ef33e47cf4, StatelessResetToken: 0x92c9056ef6aaf6a1bf46991541192b22} 2025/12/13 17:12:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:19 client <- &wire.NewTokenFrame{Token: 0x3684370d6fd004538a386793d33ef97162d88f4b0917434b24bdcdfc027cce1c734df8544beaeec62a} 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:19 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:19 client -> Sending packet 12 (62 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 1370681682, LowestAcked: 1370681669, AckRanges: {{Largest: 1370681682, Smallest: 1370681682}, {Largest: 1370681680, Smallest: 1370681680}, {Largest: 1370681678, Smallest: 1370681678}, {Largest: 1370681676, Smallest: 1370681676}, {Largest: 1370681673, Smallest: 1370681671}, {Largest: 1370681669, Smallest: 1370681669}}, DelayTime: 79.459µs, ECT0: 9, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client <- Reading packet 1370681683 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1370681683, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:19 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:19 client -> Sending packet 13 (40 bytes) for connection f70ac9971c5b899823e8542cf927480991885f25, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 83ef6874f15825294d9be0c18d00cea2ba9e, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:19 client Connection f70ac9971c5b899823e8542cf927480991885f25 closed. 2025/12/13 17:12:19 Requesting https://server4:443/quiet-few-president. 2025/12/13 17:12:19 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:19 Increased send buffer size to 14336 kiB 2025/12/13 17:12:19 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:19 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:19 Created qlog file: /logs/qlog/5bbfa14d977a5c4faab52b0add52c626dd9ca4.sqlog 2025/12/13 17:12:19 client Starting new connection to server4 ([::]:48344 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5bbfa14d977a5c4faab52b0add52c626dd9ca4, version v1 2025/12/13 17:12:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:19 client -> Sending packet 0 (1280 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5bbfa14d977a5c4faab52b0add52c626dd9ca4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:19 client -> Sending packet 1 (1280 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5bbfa14d977a5c4faab52b0add52c626dd9ca4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:19 client -> Sending packet 2 (1280 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5bbfa14d977a5c4faab52b0add52c626dd9ca4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:19 client -> Sending packet 3 (1280 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5bbfa14d977a5c4faab52b0add52c626dd9ca4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:19 client <- Reading packet 566932453 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, Token: (empty), PacketNumber: 566932453, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:19 client Received first packet. Switching destination connection ID to: 5b11579c2004868d9723bd6e0e36b1f6cdb6 2025/12/13 17:12:19 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:19 client newly acked packets (2): [2 3] 2025/12/13 17:12:19 client updated RTT: 32.840514ms (σ: 16.420257ms) 2025/12/13 17:12:19 client -> Sending packet 4 (1280 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:19 client -> &wire.PingFrame{} 2025/12/13 17:12:19 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:19 client <- Reading packet 566932455 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, Token: (empty), PacketNumber: 566932455, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 288 bytes. 2025/12/13 17:12:19 client <- Reading packet 566932452 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, PacketNumber: 566932452, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5bbfa14d977a5c4faab52b0add52c626dd9ca4, InitialSourceConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xf74a4f57f9e800c2487ee92e35dd0418, EnableResetStreamAt: false} 2025/12/13 17:12:19 client <- Reading packet 566932453 (288 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 566932453, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 566932455, LowestAcked: 566932453, AckRanges: {{Largest: 566932455, Smallest: 566932455}, {Largest: 566932453, Smallest: 566932453}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client Long Header{Type: Handshake, DestConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 566932452, LowestAcked: 566932452, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:19 client Dropping Initial keys. 2025/12/13 17:12:19 client -> Sending packet 0 (65 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 17:12:19 client <- Reading packet 566932454 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 566932454, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.PingFrame{} 2025/12/13 17:12:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:19 client <- Reading packet 566932455 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 566932455, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:19 client Dropping Handshake keys. 2025/12/13 17:12:19 client <- &wire.NewTokenFrame{Token: 0x362fdea71c1c320389bbf2dfc2035bd1bd0422dd9e8abd280b52fd7e40c70778f869bc66abde89a407} 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/12/13 17:12:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:19 client -> Sending packet 1 (48 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 566932455, LowestAcked: 566932453, DelayTime: 76.502µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client <- Reading packet 566932456 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 566932456, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/12/13 17:12:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:19 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:19 client -> Sending packet 2 (40 bytes) for connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:19 client Short Header{DestConnectionID: 5b11579c2004868d9723bd6e0e36b1f6cdb6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:19 client Connection 5bbfa14d977a5c4faab52b0add52c626dd9ca4 closed. 2025/12/13 17:12:19 Requesting https://server4:443/huge-surprised-otter. 2025/12/13 17:12:19 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:19 Increased send buffer size to 14336 kiB 2025/12/13 17:12:19 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:19 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:19 Created qlog file: /logs/qlog/06491069b1ee5cd63e562e9b9acb4be8c97c57.sqlog 2025/12/13 17:12:19 client Starting new connection to server4 ([::]:56291 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 06491069b1ee5cd63e562e9b9acb4be8c97c57, version v1 2025/12/13 17:12:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:19 client -> Sending packet 0 (1280 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 06491069b1ee5cd63e562e9b9acb4be8c97c57, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:19 client -> Sending packet 1 (1280 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 06491069b1ee5cd63e562e9b9acb4be8c97c57, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 1229, Data length: 288, Offset + Data length: 1517} 2025/12/13 17:12:19 client <- Reading packet 1315583302 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d76ddedaa20506dfc4226ce68ac005db7592, Token: (empty), PacketNumber: 1315583302, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:19 client Received first packet. Switching destination connection ID to: d76ddedaa20506dfc4226ce68ac005db7592 2025/12/13 17:12:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:19 client newly acked packets (1): [0] 2025/12/13 17:12:19 client updated RTT: 32.099339ms (σ: 16.049669ms) 2025/12/13 17:12:19 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:19 client <- Reading packet 1315583303 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d76ddedaa20506dfc4226ce68ac005db7592, Token: (empty), PacketNumber: 1315583303, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:19 client newly acked packets (1): [1] 2025/12/13 17:12:19 client updated RTT: 32.425ms (σ: 12.689ms) 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 281 bytes. 2025/12/13 17:12:19 client <- Reading packet 1315583302 (770 bytes) for connection (empty), Handshake 2025/12/13 17:12:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d76ddedaa20506dfc4226ce68ac005db7592, PacketNumber: 1315583302, PacketNumberLen: 4, Length: 741, Version: v1} 2025/12/13 17:12:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/12/13 17:12:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 06491069b1ee5cd63e562e9b9acb4be8c97c57, InitialSourceConnectionID: d76ddedaa20506dfc4226ce68ac005db7592, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x40dfeaecc5355a0913f996a763cf8235, EnableResetStreamAt: false} 2025/12/13 17:12:19 client <- Reading packet 1315583302 (281 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583302, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 518ad2197d697d1324a991736d09e2cfc8ce, StatelessResetToken: 0xcdbdaae9a2ef1e3808e9c49b7a89250a} 2025/12/13 17:12:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 129413b5c5c160af23d665e0987c88c87763, StatelessResetToken: 0x4bca4d7394a7e4ff1b4f391c29d8cf6d} 2025/12/13 17:12:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5c857f6b49206ca147c38673844856a3690e, StatelessResetToken: 0x951d2bc2f5d38cb6d377201faee9492d} 2025/12/13 17:12:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57 2025/12/13 17:12:19 client Long Header{Type: Initial, DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1069, Version: v1} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 1315583303, LowestAcked: 1315583302, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client Long Header{Type: Handshake, DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 1315583302, LowestAcked: 1315583302, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:19 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:19 client -> &wire.AckFrame{LargestAcked: 1315583302, LowestAcked: 1315583302, DelayTime: 544.735µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:19 client Dropping Initial keys. 2025/12/13 17:12:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:19 client -> Sending packet 1 (84 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, Handshake 2025/12/13 17:12:19 client Long Header{Type: Handshake, DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:19 client -> Sending packet 2 (84 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, Handshake 2025/12/13 17:12:19 client Long Header{Type: Handshake, DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:19 client <- Reading packet 1315583303 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583303, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:19 client <- &wire.PingFrame{} 2025/12/13 17:12:19 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:20 client -> Sending packet 1 (53 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1315583303, LowestAcked: 1315583302, DelayTime: 25.269847ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 17:12:20 client -> Sending packet 3 (84 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, Handshake 2025/12/13 17:12:20 client Long Header{Type: Handshake, DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:20 client -> Sending packet 4 (84 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, Handshake 2025/12/13 17:12:20 client Long Header{Type: Handshake, DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:20 client <- Reading packet 1315583306 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583306, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 518ad2197d697d1324a991736d09e2cfc8ce, StatelessResetToken: 0xcdbdaae9a2ef1e3808e9c49b7a89250a} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 129413b5c5c160af23d665e0987c88c87763, StatelessResetToken: 0x4bca4d7394a7e4ff1b4f391c29d8cf6d} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5c857f6b49206ca147c38673844856a3690e, StatelessResetToken: 0x951d2bc2f5d38cb6d377201faee9492d} 2025/12/13 17:12:20 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:20 client -> Sending packet 2 (54 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1315583306, LowestAcked: 1315583302, AckRanges: {{Largest: 1315583306, Smallest: 1315583306}, {Largest: 1315583303, Smallest: 1315583302}}, DelayTime: 98.915µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client <- Reading packet 1315583307 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583307, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:20 client Dropping Handshake keys. 2025/12/13 17:12:20 client <- &wire.NewTokenFrame{Token: 0x36f0f187f5904d908b13c0ebe9334075789877aedc50db3498736b0f369cc809ec53dc749082cfb61f} 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:20 client -> Sending packet 4 (85 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1315583307, LowestAcked: 1315583302, AckRanges: {{Largest: 1315583307, Smallest: 1315583306}, {Largest: 1315583303, Smallest: 1315583302}}, DelayTime: 95.539µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:20 client -> Sending packet 5 (68 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:20 client <- Reading packet 1315583310 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583310, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.PingFrame{} 2025/12/13 17:12:20 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:20 client -> Sending packet 6 (56 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1315583310, LowestAcked: 1315583302, AckRanges: {{Largest: 1315583310, Smallest: 1315583310}, {Largest: 1315583307, Smallest: 1315583306}, {Largest: 1315583303, Smallest: 1315583302}}, DelayTime: 85.54µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/12/13 17:12:20 client -> Sending packet 8 (68 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:20 client -> Sending packet 9 (68 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:20 client -> Sending packet 10 (1366 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.PingFrame{} 2025/12/13 17:12:20 client <- Reading packet 1315583313 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583313, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 72µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client <- Reading packet 1315583314 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583314, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 64µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client newly acked packets (1): [10] 2025/12/13 17:12:20 client updated RTT: 32.373ms (σ: 9.618ms) 2025/12/13 17:12:20 client ECN capability confirmed. 2025/12/13 17:12:20 client setting loss timer for packet 9 (1-RTT) to 36.419625ms (in %!s(monotime.Time=3611029241615)) 2025/12/13 17:12:20 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3611029241615) 2025/12/13 17:12:20 client lost packet 9 (time threshold) 2025/12/13 17:12:20 client Canceling loss detection timer. 2025/12/13 17:12:20 client -> Sending packet 11 (68 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:20 client <- Reading packet 1315583315 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1315583315, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4b22ffb88b232bf80481674426a3bbd314de, StatelessResetToken: 0xd845d3de757931af4cf187d68a3d1574} 2025/12/13 17:12:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:20 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:20 client -> Sending packet 12 (58 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1315583315, LowestAcked: 1315583302, AckRanges: {{Largest: 1315583315, Smallest: 1315583313}, {Largest: 1315583310, Smallest: 1315583310}, {Largest: 1315583307, Smallest: 1315583306}, {Largest: 1315583303, Smallest: 1315583302}}, DelayTime: 92.673µs, ECT0: 7, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:20 client -> Sending packet 13 (40 bytes) for connection 06491069b1ee5cd63e562e9b9acb4be8c97c57, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 5c857f6b49206ca147c38673844856a3690e, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:20 client Connection 06491069b1ee5cd63e562e9b9acb4be8c97c57 closed. 2025/12/13 17:12:20 Requesting https://server4:443/small-extreme-cheetah. 2025/12/13 17:12:20 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:20 Increased send buffer size to 14336 kiB 2025/12/13 17:12:20 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:20 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:20 Created qlog file: /logs/qlog/9b5a4e1e99256c5fbe193765d1.sqlog 2025/12/13 17:12:20 client Starting new connection to server4 ([::]:51865 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9b5a4e1e99256c5fbe193765d1, version v1 2025/12/13 17:12:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:20 client -> Sending packet 0 (1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 9b5a4e1e99256c5fbe193765d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 17:12:20 client -> Sending packet 1 (1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 9b5a4e1e99256c5fbe193765d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:20 client updated RTT: 33.17501ms (σ: 16.587505ms) 2025/12/13 17:12:20 client <- Received Retry: 2025/12/13 17:12:20 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 5b82a94effd072dd68847b1b91dce1ab9f01, Token: 0xb7aa1c0fad1d417c3152f63025c6bbcc7e5e8ad26e11db04eeb8bc99ff9255483966a49cf74b0cb7287b5c5d26b828cac4b62c249743522b8a384080e2a0e653e46d3d0a7089412b832b9e4ccb6f0c90dbf0690724d4a3450137, Version: v1} 2025/12/13 17:12:20 client Switching destination connection ID to: 5b82a94effd072dd68847b1b91dce1ab9f01 2025/12/13 17:12:20 client -> Sending packet 2 (1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 5b82a94effd072dd68847b1b91dce1ab9f01, SrcConnectionID: (empty), Token: 0xb7aa1c0fad1d417c3152f63025c6bbcc7e5e8ad26e11db04eeb8bc99ff9255483966a49cf74b0cb7287b5c5d26b828cac4b62c249743522b8a384080e2a0e653e46d3d0a7089412b832b9e4ccb6f0c90dbf0690724d4a3450137, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:20 client -> Sending packet 3 (1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 5b82a94effd072dd68847b1b91dce1ab9f01, SrcConnectionID: (empty), Token: 0xb7aa1c0fad1d417c3152f63025c6bbcc7e5e8ad26e11db04eeb8bc99ff9255483966a49cf74b0cb7287b5c5d26b828cac4b62c249743522b8a384080e2a0e653e46d3d0a7089412b832b9e4ccb6f0c90dbf0690724d4a3450137, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 17:12:20 client <- Reading packet 1635314585 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6440685677c068e7babb62f4ab36faa5424a, Token: (empty), PacketNumber: 1635314585, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:20 client Received first packet. Switching destination connection ID to: 6440685677c068e7babb62f4ab36faa5424a 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:20 client newly acked packets (1): [2] 2025/12/13 17:12:20 client updated RTT: 33.066ms (σ: 12.657ms) 2025/12/13 17:12:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:20 client -> Sending packet 4 (1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 6440685677c068e7babb62f4ab36faa5424a, SrcConnectionID: (empty), Token: 0xb7aa1c0fad1d417c3152f63025c6bbcc7e5e8ad26e11db04eeb8bc99ff9255483966a49cf74b0cb7287b5c5d26b828cac4b62c249743522b8a384080e2a0e653e46d3d0a7089412b832b9e4ccb6f0c90dbf0690724d4a3450137, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/12/13 17:12:20 client -> Sending packet 5 (1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 6440685677c068e7babb62f4ab36faa5424a, SrcConnectionID: (empty), Token: 0xb7aa1c0fad1d417c3152f63025c6bbcc7e5e8ad26e11db04eeb8bc99ff9255483966a49cf74b0cb7287b5c5d26b828cac4b62c249743522b8a384080e2a0e653e46d3d0a7089412b832b9e4ccb6f0c90dbf0690724d4a3450137, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/12/13 17:12:20 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:20 client <- Reading packet 1635314586 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6440685677c068e7babb62f4ab36faa5424a, Token: (empty), PacketNumber: 1635314586, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Parsed a coalesced packet. Part 2: 784 bytes. Remaining: 265 bytes. 2025/12/13 17:12:20 client <- Reading packet 1635314585 (784 bytes) for connection (empty), Handshake 2025/12/13 17:12:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6440685677c068e7babb62f4ab36faa5424a, PacketNumber: 1635314585, PacketNumberLen: 4, Length: 755, Version: v1} 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/12/13 17:12:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9b5a4e1e99256c5fbe193765d1, InitialSourceConnectionID: 6440685677c068e7babb62f4ab36faa5424a, RetrySourceConnectionID: 5b82a94effd072dd68847b1b91dce1ab9f01, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xfd8def84c79242a2357d34cef03fb403, EnableResetStreamAt: false} 2025/12/13 17:12:20 client <- Reading packet 1635314585 (265 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1635314585, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e24e8e070bcd2ed2f6dd70e861ab277feb59, StatelessResetToken: 0xb4faa98e7752eaa6712f1e801e08ff34} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b80dd145e8af1cc0356734865baea48a4e35, StatelessResetToken: 0xc22846a3e17a116f173e7d33f7491589} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, StatelessResetToken: 0xb80c4613328fddf6fb2d70ae4d9a1dbd} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9b5a4e1e99256c5fbe193765d1 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, SrcConnectionID: (empty), Token: 0xb7aa1c0fad1d417c3152f63025c6bbcc7e5e8ad26e11db04eeb8bc99ff9255483966a49cf74b0cb7287b5c5d26b828cac4b62c249743522b8a384080e2a0e653e46d3d0a7089412b832b9e4ccb6f0c90dbf0690724d4a3450137, PacketNumber: 6, PacketNumberLen: 2, Length: 1007, Version: v1} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1635314586, LowestAcked: 1635314585, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Long Header{Type: Handshake, DestConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1635314585, LowestAcked: 1635314585, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:20 client Short Header{DestConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1635314585, LowestAcked: 1635314585, DelayTime: 705.897µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client Dropping Initial keys. 2025/12/13 17:12:20 client -> Sending packet 1 (67 bytes) for connection 9b5a4e1e99256c5fbe193765d1, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:20 client <- Reading packet 1635314587 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1635314587, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 392µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Peer doesn't await address validation any longer. 2025/12/13 17:12:20 client newly acked packets (2): [0 1] 2025/12/13 17:12:20 client Ignoring all packets below 1635314586. 2025/12/13 17:12:20 client updated RTT: 33.213ms (σ: 9.788ms) 2025/12/13 17:12:20 client ECN capability confirmed. 2025/12/13 17:12:20 client Canceling loss detection timer. 2025/12/13 17:12:20 client Dropping Handshake keys. 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f6fe3c2fa2434fd9eedaf9e1dd1c0b717dcc, StatelessResetToken: 0x28dccf1ecfed04626ea089674d8cc675} 2025/12/13 17:12:20 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:20 client <- &wire.NewTokenFrame{Token: 0x3607b679dc053d194d50cab4cd6a3f7947600350bbef4b9751811b58a6ceb69ed21e162957441f74b0} 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:20 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:20 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:20 client -> Sending packet 2 (52 bytes) for connection 9b5a4e1e99256c5fbe193765d1, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1635314587, LowestAcked: 1635314587, DelayTime: 125.444µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client <- Reading packet 1635314588 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1635314588, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:20 client -> Sending packet 3 (40 bytes) for connection 9b5a4e1e99256c5fbe193765d1, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: 13093bfe9a890b1e8c19b2653b3a373dc974, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:20 client Connection 9b5a4e1e99256c5fbe193765d1 closed. 2025/12/13 17:12:20 Requesting https://server4:443/tremendous-chilly-golfcart. 2025/12/13 17:12:20 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:20 Increased send buffer size to 14336 kiB 2025/12/13 17:12:20 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:20 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:20 Created qlog file: /logs/qlog/a989e3cfd5e1e2c7b39a.sqlog 2025/12/13 17:12:20 client Starting new connection to server4 ([::]:42904 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a989e3cfd5e1e2c7b39a, version v1 2025/12/13 17:12:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:20 client -> Sending packet 0 (1280 bytes) for connection a989e3cfd5e1e2c7b39a, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: a989e3cfd5e1e2c7b39a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:20 client -> Sending packet 1 (1280 bytes) for connection a989e3cfd5e1e2c7b39a, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: a989e3cfd5e1e2c7b39a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1238, Data length: 272, Offset + Data length: 1510} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:20 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:20 client <- Reading packet 1564690015 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 361dccb5680ef107f0ac853eb498d8756ee4, Token: (empty), PacketNumber: 1564690015, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:20 client Received first packet. Switching destination connection ID to: 361dccb5680ef107f0ac853eb498d8756ee4 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:20 client newly acked packets (2): [0 1] 2025/12/13 17:12:20 client updated RTT: 34.523825ms (σ: 17.261912ms) 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 292 bytes. 2025/12/13 17:12:20 client <- Reading packet 1564690014 (759 bytes) for connection (empty), Handshake 2025/12/13 17:12:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 361dccb5680ef107f0ac853eb498d8756ee4, PacketNumber: 1564690014, PacketNumberLen: 4, Length: 730, Version: v1} 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/12/13 17:12:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a989e3cfd5e1e2c7b39a, InitialSourceConnectionID: 361dccb5680ef107f0ac853eb498d8756ee4, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x17fe06e36f9db0a05348c1ae36400391, EnableResetStreamAt: false} 2025/12/13 17:12:20 client <- Reading packet 1564690014 (292 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1564690014, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8bc358feb0bf0a8b63b26a721f7f35d6fcc, StatelessResetToken: 0x97d58efa3ba5a22571f1dafe994e4a90} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb23b7e1f2828a349cc8d51d793435741945, StatelessResetToken: 0x37e15743a25ae95313ebbf1e0f65e77a} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, StatelessResetToken: 0x7b1f549062c225e4c39c4acab616e42c} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a989e3cfd5e1e2c7b39a 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1564690015, LowestAcked: 1564690015, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Long Header{Type: Handshake, DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1564690014, LowestAcked: 1564690014, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1564690014, LowestAcked: 1564690014, DelayTime: 611.681µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:20 client Dropping Initial keys. 2025/12/13 17:12:20 client -> Sending packet 1 (72 bytes) for connection a989e3cfd5e1e2c7b39a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:20 client <- Reading packet 1564690015 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1564690015, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.PingFrame{} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client <- Reading packet 1564690017 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1564690017, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.88ms} 2025/12/13 17:12:20 client Peer doesn't await address validation any longer. 2025/12/13 17:12:20 client newly acked packets (1): [0] 2025/12/13 17:12:20 client Ignoring all packets below 1564690015. 2025/12/13 17:12:20 client updated RTT: 34.788ms (σ: 13.477ms) 2025/12/13 17:12:20 client Dropping Handshake keys. 2025/12/13 17:12:20 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:20 client -> Sending packet 2 (55 bytes) for connection a989e3cfd5e1e2c7b39a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1564690017, LowestAcked: 1564690015, AckRanges: {{Largest: 1564690017, Smallest: 1564690017}, {Largest: 1564690015, Smallest: 1564690015}}, DelayTime: 22.248835ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client <- Reading packet 1564690018 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1564690018, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.PingFrame{} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client <- Reading packet 1564690019 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1564690019, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b714de537a870c310edcf698e5cfc22bf9, StatelessResetToken: 0x4c2dc735bf47af5ebb989d6d3582ef11} 2025/12/13 17:12:20 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:20 client <- &wire.NewTokenFrame{Token: 0x36dc864d71d2ee84176a95607ebe7a74b0b85730d179cf4520a64dd7a0fdc7f0f08561c14f999695e3} 2025/12/13 17:12:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:20 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:20 client -> Sending packet 3 (54 bytes) for connection a989e3cfd5e1e2c7b39a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.AckFrame{LargestAcked: 1564690019, LowestAcked: 1564690015, AckRanges: {{Largest: 1564690019, Smallest: 1564690017}, {Largest: 1564690015, Smallest: 1564690015}}, DelayTime: 85.71µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:20 client -> Sending packet 5 (72 bytes) for connection a989e3cfd5e1e2c7b39a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:20 client -> Sending packet 6 (72 bytes) for connection a989e3cfd5e1e2c7b39a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 33, Offset + Data length: 33} 2025/12/13 17:12:20 client <- Reading packet 1564690020 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1564690020, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 168µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:20 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:20 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:20 client -> Sending packet 7 (40 bytes) for connection a989e3cfd5e1e2c7b39a, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:20 client Short Header{DestConnectionID: a2f2d2c406d71d3c78314d98ab16dce7b492, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:20 client Connection a989e3cfd5e1e2c7b39a closed. 2025/12/13 17:12:20 Requesting https://server4:443/warm-magenta-zapdos. 2025/12/13 17:12:20 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:20 Increased send buffer size to 14336 kiB 2025/12/13 17:12:20 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:20 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:20 Created qlog file: /logs/qlog/a8295c3e55921a4e.sqlog 2025/12/13 17:12:20 client Starting new connection to server4 ([::]:46680 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a8295c3e55921a4e, version v1 2025/12/13 17:12:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:20 client -> Sending packet 0 (1280 bytes) for connection a8295c3e55921a4e, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: a8295c3e55921a4e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 17:12:20 client -> Sending packet 1 (1280 bytes) for connection a8295c3e55921a4e, Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: a8295c3e55921a4e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:20 client -> &wire.CryptoFrame{Offset: 1240, Data length: 267, Offset + Data length: 1507} 2025/12/13 17:12:20 client <- Reading packet 345817219 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, Token: (empty), PacketNumber: 345817219, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:20 client Received first packet. Switching destination connection ID to: 2803bebc663e4b6339189e86be9b68bd9353 2025/12/13 17:12:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:20 client newly acked packets (1): [0] 2025/12/13 17:12:20 client updated RTT: 32.078359ms (σ: 16.039179ms) 2025/12/13 17:12:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:21 client -> Sending packet 2 (1280 bytes) for connection a8295c3e55921a4e, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1240, Data length: 267, Offset + Data length: 1507} 2025/12/13 17:12:21 client -> Sending packet 3 (1280 bytes) for connection a8295c3e55921a4e, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1240, Data length: 267, Offset + Data length: 1507} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client <- Reading packet 345817222 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, Token: (empty), PacketNumber: 345817222, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:21 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:21 client newly acked packets (1): [3] 2025/12/13 17:12:21 client updated RTT: 32.187ms (σ: 12.248ms) 2025/12/13 17:12:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:21 client -> Sending packet 4 (1280 bytes) for connection a8295c3e55921a4e, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.PingFrame{} 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/12/13 17:12:21 client <- Reading packet 345817223 (56 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, Token: (empty), PacketNumber: 345817223, PacketNumberLen: 4, Length: 26, Version: v1} 2025/12/13 17:12:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:21 client newly acked packets (1): [4] 2025/12/13 17:12:21 client updated RTT: 32.268ms (σ: 9.349ms) 2025/12/13 17:12:21 client <- &wire.PingFrame{} 2025/12/13 17:12:21 client Queueing packet (1144 bytes) for later decryption 2025/12/13 17:12:21 client -> Sending packet 5 (1280 bytes) for connection a8295c3e55921a4e, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 345817223, LowestAcked: 345817219, AckRanges: {{Largest: 345817223, Smallest: 345817222}, {Largest: 345817219, Smallest: 345817219}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:21 client <- Reading packet 345817224 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, Token: (empty), PacketNumber: 345817224, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 299 bytes. 2025/12/13 17:12:21 client <- Reading packet 345817221 (757 bytes) for connection (empty), Handshake 2025/12/13 17:12:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, PacketNumber: 345817221, PacketNumberLen: 4, Length: 728, Version: v1} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/12/13 17:12:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a8295c3e55921a4e, InitialSourceConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x408cf72c140b746c83ea32a0727f4b56, EnableResetStreamAt: false} 2025/12/13 17:12:21 client <- Reading packet 345817222 (299 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 345817222, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a8295c3e55921a4e 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 345817224, LowestAcked: 345817219, AckRanges: {{Largest: 345817224, Smallest: 345817222}, {Largest: 345817219, Smallest: 345817219}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client Long Header{Type: Handshake, DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 345817221, LowestAcked: 345817221, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:21 client Dropping Initial keys. 2025/12/13 17:12:21 client <- Reading packet 345817221 (1144 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 345817221, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.PingFrame{} 2025/12/13 17:12:21 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:21 client -> Sending packet 0 (77 bytes) for connection a8295c3e55921a4e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: 2803bebc663e4b6339189e86be9b68bd9353, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 345817222, LowestAcked: 345817221, DelayTime: 704.274µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 17:12:21 client <- Reading packet 345817223 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 345817223, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.PingFrame{} 2025/12/13 17:12:21 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:21 client <- Reading packet 345817224 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 345817224, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a0b57d84ceca74c4993a9451e42fac66ae64, StatelessResetToken: 0x55e6724303b8b3d41d266b121fa7d4ca} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 65921458a6b1c3d2edaccd2101ef362d7b27, StatelessResetToken: 0x5d8521108e52c12e9769f34484ffaae2} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fd3baf5c1d11efb412da9755c6d49ea64f7, StatelessResetToken: 0xefc34d1789b1dc9c6f3b3c5bfa703e84} 2025/12/13 17:12:21 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:21 client Dropping Handshake keys. 2025/12/13 17:12:21 client <- &wire.NewTokenFrame{Token: 0x36ad2c2b54b0c641026ce92bea1f8348fb4e40ddd7b888696f7ab6bff9e66217653a89687b7b29e401} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 779, Offset + Data length: 779} 2025/12/13 17:12:21 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:21 client -> Sending packet 1 (50 bytes) for connection a8295c3e55921a4e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: 4fd3baf5c1d11efb412da9755c6d49ea64f7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 345817224, LowestAcked: 345817221, DelayTime: 119.393µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:21 client <- Reading packet 345817225 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 345817225, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 779, Data length: 245, Offset + Data length: 1024} 2025/12/13 17:12:21 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:21 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:21 client -> Sending packet 2 (40 bytes) for connection a8295c3e55921a4e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: 4fd3baf5c1d11efb412da9755c6d49ea64f7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:21 client Connection a8295c3e55921a4e closed. 2025/12/13 17:12:21 Requesting https://server4:443/mild-sufficient-jaguar. 2025/12/13 17:12:21 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:21 Increased send buffer size to 14336 kiB 2025/12/13 17:12:21 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:21 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:21 Created qlog file: /logs/qlog/0380d2f24d84e19cd91b38ac8389bb6fe4.sqlog 2025/12/13 17:12:21 client Starting new connection to server4 ([::]:37767 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0380d2f24d84e19cd91b38ac8389bb6fe4, version v1 2025/12/13 17:12:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:21 client -> Sending packet 0 (1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 0380d2f24d84e19cd91b38ac8389bb6fe4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/12/13 17:12:21 client -> Sending packet 1 (1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 0380d2f24d84e19cd91b38ac8389bb6fe4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1231, Data length: 287, Offset + Data length: 1518} 2025/12/13 17:12:21 client <- Reading packet 274268488 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, Token: (empty), PacketNumber: 274268488, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:21 client Received first packet. Switching destination connection ID to: 81f1f4c32414fd03ec7691b9a88a39e92254 2025/12/13 17:12:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:21 client newly acked packets (1): [0] 2025/12/13 17:12:21 client updated RTT: 32.035123ms (σ: 16.017561ms) 2025/12/13 17:12:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:21 client -> Sending packet 2 (1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1231, Data length: 287, Offset + Data length: 1518} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client -> Sending packet 3 (1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1231, Data length: 287, Offset + Data length: 1518} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:21 client -> Sending packet 4 (1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1231, Data length: 287, Offset + Data length: 1518} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client -> Sending packet 5 (1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1231, Data length: 287, Offset + Data length: 1518} 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:21 client <- Reading packet 274268490 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, Token: (empty), PacketNumber: 274268490, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 281 bytes. 2025/12/13 17:12:21 client <- Reading packet 274268489 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, PacketNumber: 274268489, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0380d2f24d84e19cd91b38ac8389bb6fe4, InitialSourceConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd73da2d204e1c93bf6f1e969d61e215b, EnableResetStreamAt: false} 2025/12/13 17:12:21 client <- Reading packet 274268489 (281 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 274268489, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 274268490, LowestAcked: 274268488, AckRanges: {{Largest: 274268490, Smallest: 274268490}, {Largest: 274268488, Smallest: 274268488}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client Long Header{Type: Handshake, DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 274268489, LowestAcked: 274268489, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:21 client Dropping Initial keys. 2025/12/13 17:12:21 client -> Sending packet 0 (68 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:21 client <- Reading packet 274268491 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 274268491, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:21 client Dropping Handshake keys. 2025/12/13 17:12:21 client <- &wire.NewTokenFrame{Token: 0x364952d14cce64bce6c674cf404d7a82a6c6cfb51d36b3dad1e7868d0a3681804cdd42b84a6d2d1688} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/12/13 17:12:21 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:21 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:21 client -> Sending packet 1 (51 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: 81f1f4c32414fd03ec7691b9a88a39e92254, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 274268491, LowestAcked: 274268489, AckRanges: {{Largest: 274268491, Smallest: 274268491}, {Largest: 274268489, Smallest: 274268489}}, DelayTime: 25.279712ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client <- Reading packet 274268494 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 274268494, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f56b2f1ec8ccc8a56e95da848048e1a1f10, StatelessResetToken: 0x89ac82d2f61a10e95459268ffc27e2f2} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b7a58272c79b2848b71b10837e9b95e0fe63, StatelessResetToken: 0xde6d1bf2cad16f0c22bce6b43909e50b} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e71093159989158333d62156adc2fe498763, StatelessResetToken: 0xb70ccc54a4274650dd2d33b267a4789a} 2025/12/13 17:12:21 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:21 client -> Sending packet 2 (54 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: e71093159989158333d62156adc2fe498763, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 274268494, LowestAcked: 274268489, AckRanges: {{Largest: 274268494, Smallest: 274268494}, {Largest: 274268491, Smallest: 274268491}, {Largest: 274268489, Smallest: 274268489}}, DelayTime: 171.73µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:21 client <- Reading packet 274268495 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 274268495, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.PingFrame{} 2025/12/13 17:12:21 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:21 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:21 client -> Sending packet 3 (53 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: e71093159989158333d62156adc2fe498763, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 274268495, LowestAcked: 274268489, AckRanges: {{Largest: 274268495, Smallest: 274268494}, {Largest: 274268491, Smallest: 274268491}, {Largest: 274268489, Smallest: 274268489}}, DelayTime: 25.246941ms, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client <- Reading packet 274268497 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 274268497, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/12/13 17:12:21 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:21 client -> Sending packet 4 (1366 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: e71093159989158333d62156adc2fe498763, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.PingFrame{} 2025/12/13 17:12:21 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:21 client -> Sending packet 5 (40 bytes) for connection 0380d2f24d84e19cd91b38ac8389bb6fe4, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: e71093159989158333d62156adc2fe498763, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:21 client Connection 0380d2f24d84e19cd91b38ac8389bb6fe4 closed. 2025/12/13 17:12:21 Requesting https://server4:443/cyan-numerous-suitcase. 2025/12/13 17:12:21 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:21 Increased send buffer size to 14336 kiB 2025/12/13 17:12:21 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:21 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:21 Created qlog file: /logs/qlog/a2b7c4d1882bffaa27323ec07d.sqlog 2025/12/13 17:12:21 client Starting new connection to server4 ([::]:40604 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a2b7c4d1882bffaa27323ec07d, version v1 2025/12/13 17:12:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:21 client -> Sending packet 0 (1280 bytes) for connection a2b7c4d1882bffaa27323ec07d, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: a2b7c4d1882bffaa27323ec07d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:21 client -> Sending packet 1 (1280 bytes) for connection a2b7c4d1882bffaa27323ec07d, Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: a2b7c4d1882bffaa27323ec07d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:21 client <- Reading packet 2035457915 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e87f915f268feb963bc6a97580f770a52a16, Token: (empty), PacketNumber: 2035457915, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:21 client Received first packet. Switching destination connection ID to: e87f915f268feb963bc6a97580f770a52a16 2025/12/13 17:12:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:21 client newly acked packets (1): [0] 2025/12/13 17:12:21 client updated RTT: 32.405924ms (σ: 16.202962ms) 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:21 client <- Reading packet 2035457916 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e87f915f268feb963bc6a97580f770a52a16, Token: (empty), PacketNumber: 2035457916, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:21 client newly acked packets (1): [1] 2025/12/13 17:12:21 client updated RTT: 32.735ms (σ: 12.812ms) 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Parsed a coalesced packet. Part 2: 762 bytes. Remaining: 289 bytes. 2025/12/13 17:12:21 client <- Reading packet 2035457915 (762 bytes) for connection (empty), Handshake 2025/12/13 17:12:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e87f915f268feb963bc6a97580f770a52a16, PacketNumber: 2035457915, PacketNumberLen: 4, Length: 733, Version: v1} 2025/12/13 17:12:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/12/13 17:12:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a2b7c4d1882bffaa27323ec07d, InitialSourceConnectionID: e87f915f268feb963bc6a97580f770a52a16, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xbacb85b5edb513c88b8a4f1045193b33, EnableResetStreamAt: false} 2025/12/13 17:12:21 client <- Reading packet 2035457915 (289 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2035457915, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 44bb376757a36bdc40692f8ea9f1afffb07b, StatelessResetToken: 0x055f6f83eaf9849218ae694a90a9548c} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1d2254ddaad60e06f878c390c4bb7afd038e, StatelessResetToken: 0x6a746fca5e030d4e387ac33f0cdfc3b3} 2025/12/13 17:12:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de5358c15f3daa065b02219502f5c893ed72, StatelessResetToken: 0x4766478011b9848f3a3c59c58e8b9686} 2025/12/13 17:12:21 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a2b7c4d1882bffaa27323ec07d 2025/12/13 17:12:21 client Long Header{Type: Initial, DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 2035457916, LowestAcked: 2035457915, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client Long Header{Type: Handshake, DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 2035457915, LowestAcked: 2035457915, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:21 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.AckFrame{LargestAcked: 2035457915, LowestAcked: 2035457915, DelayTime: 546.55µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:21 client Dropping Initial keys. 2025/12/13 17:12:21 client -> Sending packet 1 (68 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:21 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:22 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:22 client -> Sending packet 1 (84 bytes) for connection a2b7c4d1882bffaa27323ec07d, Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client -> Sending packet 2 (84 bytes) for connection a2b7c4d1882bffaa27323ec07d, Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client <- Reading packet 2035457916 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2035457916, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.PingFrame{} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client <- Reading packet 2035457917 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2035457917, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.952ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client Peer doesn't await address validation any longer. 2025/12/13 17:12:22 client newly acked packets (1): [1] 2025/12/13 17:12:22 client updated RTT: 40.212ms (σ: 24.564ms) 2025/12/13 17:12:22 client ECN capability confirmed. 2025/12/13 17:12:22 client lost packet 0 (time threshold) 2025/12/13 17:12:22 client Canceling loss detection timer. 2025/12/13 17:12:22 client Dropping Handshake keys. 2025/12/13 17:12:22 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:22 client <- &wire.NewTokenFrame{Token: 0x3625fa9faef66d3977de795770777bbbc637dc2af06137114ceebdcc4b87c74757a88da948a28c941a} 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:22 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 881, Offset + Data length: 881} 2025/12/13 17:12:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:22 client -> Sending packet 2 (54 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 2035457917, LowestAcked: 2035457915, DelayTime: 136.044µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:22 client -> Sending packet 4 (39 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client -> Sending packet 5 (39 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client <- Reading packet 2035457919 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2035457919, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client newly acked packets (1): [5] 2025/12/13 17:12:22 client updated RTT: 39.172ms (σ: 20.502ms) 2025/12/13 17:12:22 client Canceling loss detection timer. 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7642e0b56839ba8f0270c5ddb2c88d3feef9, StatelessResetToken: 0xf691830a2a68ad9de5e5815b6d898748} 2025/12/13 17:12:22 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:22 client -> Sending packet 6 (54 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 2035457919, LowestAcked: 2035457915, AckRanges: {{Largest: 2035457919, Smallest: 2035457919}, {Largest: 2035457917, Smallest: 2035457915}}, DelayTime: 108.523µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client <- Reading packet 2035457921 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2035457921, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 881, Data length: 143, Offset + Data length: 1024} 2025/12/13 17:12:22 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:22 client -> Sending packet 7 (1366 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.PingFrame{} 2025/12/13 17:12:22 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:22 client -> Sending packet 8 (40 bytes) for connection a2b7c4d1882bffaa27323ec07d, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: de5358c15f3daa065b02219502f5c893ed72, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:22 client Connection a2b7c4d1882bffaa27323ec07d closed. 2025/12/13 17:12:22 Requesting https://server4:443/gigantic-many-thief. 2025/12/13 17:12:22 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:22 Increased send buffer size to 14336 kiB 2025/12/13 17:12:22 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:22 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:22 Created qlog file: /logs/qlog/3042b56369c81cf7a643a0b6d2fd.sqlog 2025/12/13 17:12:22 client Starting new connection to server4 ([::]:44551 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3042b56369c81cf7a643a0b6d2fd, version v1 2025/12/13 17:12:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:22 client -> Sending packet 0 (1280 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 3042b56369c81cf7a643a0b6d2fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:22 client -> Sending packet 1 (1280 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 3042b56369c81cf7a643a0b6d2fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/12/13 17:12:22 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:22 client <- Reading packet 1874389432 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a80fefc4781eab08f1c694a93fef816921ad, Token: (empty), PacketNumber: 1874389432, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:22 client Received first packet. Switching destination connection ID to: a80fefc4781eab08f1c694a93fef816921ad 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:22 client newly acked packets (2): [0 1] 2025/12/13 17:12:22 client updated RTT: 34.861286ms (σ: 17.430643ms) 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Parsed a coalesced packet. Part 2: 765 bytes. Remaining: 286 bytes. 2025/12/13 17:12:22 client <- Reading packet 1874389431 (765 bytes) for connection (empty), Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a80fefc4781eab08f1c694a93fef816921ad, PacketNumber: 1874389431, PacketNumberLen: 4, Length: 736, Version: v1} 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/12/13 17:12:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3042b56369c81cf7a643a0b6d2fd, InitialSourceConnectionID: a80fefc4781eab08f1c694a93fef816921ad, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x7e9731eb75983adee56b57b3cfb81df5, EnableResetStreamAt: false} 2025/12/13 17:12:22 client <- Reading packet 1874389431 (286 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1874389431, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c744c923f3e266dd525d29a035a3ce7474ef, StatelessResetToken: 0x2ca1445a6e7b34c40c53258021cc8aaa} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b47195032f0a22101acfe63b9717d6886258, StatelessResetToken: 0x820c73188d96121691493d9ac8ba2359} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4a6c9765260f7727d0790296236ca2295713, StatelessResetToken: 0x4d37d760f58f8f24eebaee72154a04e9} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3042b56369c81cf7a643a0b6d2fd 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1070, Version: v1} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1874389432, LowestAcked: 1874389432, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1874389431, LowestAcked: 1874389431, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client Short Header{DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1874389431, LowestAcked: 1874389431, DelayTime: 661.004µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 17:12:22 client Dropping Initial keys. 2025/12/13 17:12:22 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:22 client -> Sending packet 1 (84 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client -> Sending packet 2 (84 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client <- Reading packet 1874389432 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1874389432, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.PingFrame{} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client <- Reading packet 1874389433 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1874389433, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:22 client Dropping Handshake keys. 2025/12/13 17:12:22 client <- &wire.NewTokenFrame{Token: 0x36d6ec47a2ba825b3e137fe405a01446493ad3e98900c03331c739fa5c1738b670f08bcd716b24d7b5} 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:22 client -> Sending packet 2 (82 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1874389433, LowestAcked: 1874389431, DelayTime: 78.487µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 17:12:22 client -> Sending packet 3 (67 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 17:12:22 client <- Reading packet 1874389434 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1874389434, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.PingFrame{} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client <- Reading packet 1874389435 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1874389435, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 200µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client newly acked packets (1): [3] 2025/12/13 17:12:22 client updated RTT: 34.677ms (σ: 13.439ms) 2025/12/13 17:12:22 client ECN capability confirmed. 2025/12/13 17:12:22 client Canceling loss detection timer. 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 71225bc6792184ddc113073a2452bf574ba9, StatelessResetToken: 0xf16e010a3a38f9e79f315765fd405c02} 2025/12/13 17:12:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:22 client -> Sending packet 4 (52 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1874389435, LowestAcked: 1874389431, DelayTime: 96.57µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:22 client -> Sending packet 5 (40 bytes) for connection 3042b56369c81cf7a643a0b6d2fd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 4a6c9765260f7727d0790296236ca2295713, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:22 client Connection 3042b56369c81cf7a643a0b6d2fd closed. 2025/12/13 17:12:22 Requesting https://server4:443/dirty-rough-fisherman. 2025/12/13 17:12:22 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:22 Increased send buffer size to 14336 kiB 2025/12/13 17:12:22 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:22 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:22 Created qlog file: /logs/qlog/f0114d71389305fac89e0e.sqlog 2025/12/13 17:12:22 client Starting new connection to server4 ([::]:40558 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f0114d71389305fac89e0e, version v1 2025/12/13 17:12:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:22 client -> Sending packet 0 (1280 bytes) for connection f0114d71389305fac89e0e, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: f0114d71389305fac89e0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:22 client -> Sending packet 1 (1280 bytes) for connection f0114d71389305fac89e0e, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: f0114d71389305fac89e0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 1237, Data length: 267, Offset + Data length: 1504} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:22 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:22 client <- Reading packet 1911553086 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ddd1623340571da93d2467eb498304fa7584, Token: (empty), PacketNumber: 1911553086, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:22 client Received first packet. Switching destination connection ID to: ddd1623340571da93d2467eb498304fa7584 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:22 client newly acked packets (2): [0 1] 2025/12/13 17:12:22 client updated RTT: 34.659048ms (σ: 17.329524ms) 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 290 bytes. 2025/12/13 17:12:22 client <- Reading packet 1911553085 (761 bytes) for connection (empty), Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ddd1623340571da93d2467eb498304fa7584, PacketNumber: 1911553085, PacketNumberLen: 4, Length: 732, Version: v1} 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/12/13 17:12:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f0114d71389305fac89e0e, InitialSourceConnectionID: ddd1623340571da93d2467eb498304fa7584, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xdccb27f7f7439dc6387254dca904862c, EnableResetStreamAt: false} 2025/12/13 17:12:22 client <- Reading packet 1911553085 (290 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1911553085, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6414005f39077ba8090f3ccea24ea943d2e, StatelessResetToken: 0x9a413e80a1760ca958ab43ac2e267302} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0a9cf471f885b64bf1290626c26b4ac8c8d7, StatelessResetToken: 0x01a8fb2c04a19bcf43e59c7649ac6dac} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, StatelessResetToken: 0xe2f2a19ee6259e29f496ab3d18e518df} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f0114d71389305fac89e0e 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1911553086, LowestAcked: 1911553086, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1911553085, LowestAcked: 1911553085, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1911553085, LowestAcked: 1911553085, DelayTime: 726.727µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client Dropping Initial keys. 2025/12/13 17:12:22 client -> Sending packet 1 (67 bytes) for connection f0114d71389305fac89e0e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:22 client <- Reading packet 1911553086 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1911553086, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.PingFrame{} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client <- Reading packet 1911553087 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1911553087, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3b1dc8e8f2fb911778799d7055bd0da14fc8, StatelessResetToken: 0x6d805df7a17846e75aa1b027c43df459} 2025/12/13 17:12:22 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:22 client Dropping Handshake keys. 2025/12/13 17:12:22 client <- &wire.NewTokenFrame{Token: 0x365612cdd6b4e7cbed3772ba485e83dbe5b6841c2c71e4ecf4cd3856e5185c33d9dc83fdfa324bc208} 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:22 client -> Sending packet 2 (52 bytes) for connection f0114d71389305fac89e0e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1911553087, LowestAcked: 1911553085, DelayTime: 80.31µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client <- Reading packet 1911553088 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1911553088, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.984ms} 2025/12/13 17:12:22 client newly acked packets (1): [0] 2025/12/13 17:12:22 client Ignoring all packets below 1911553086. 2025/12/13 17:12:22 client updated RTT: 34.922ms (σ: 13.524ms) 2025/12/13 17:12:22 client <- Reading packet 1911553089 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1911553089, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.PingFrame{} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:22 client -> Sending packet 3 (53 bytes) for connection f0114d71389305fac89e0e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1911553089, LowestAcked: 1911553086, DelayTime: 25.295692ms, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:22 client -> Sending packet 5 (67 bytes) for connection f0114d71389305fac89e0e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:22 client -> Sending packet 6 (67 bytes) for connection f0114d71389305fac89e0e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:22 client <- Reading packet 1911553090 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1911553090, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 48µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client newly acked packets (1): [6] 2025/12/13 17:12:22 client updated RTT: 34.586ms (σ: 10.813ms) 2025/12/13 17:12:22 client ECN capability confirmed. 2025/12/13 17:12:22 client Canceling loss detection timer. 2025/12/13 17:12:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:22 client -> Sending packet 7 (40 bytes) for connection f0114d71389305fac89e0e, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 6be176d1396c8a54ccd9a39ce4a786bac473, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:22 client Connection f0114d71389305fac89e0e closed. 2025/12/13 17:12:22 Requesting https://server4:443/cold-monstrous-teacher. 2025/12/13 17:12:22 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:22 Increased send buffer size to 14336 kiB 2025/12/13 17:12:22 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:22 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:22 Created qlog file: /logs/qlog/2f82ef39ebc95a1c52c3adcbfbe31f18ed70.sqlog 2025/12/13 17:12:22 client Starting new connection to server4 ([::]:49439 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, version v1 2025/12/13 17:12:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:22 client -> Sending packet 0 (1280 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 17:12:22 client -> Sending packet 1 (1280 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 1230, Data length: 283, Offset + Data length: 1513} 2025/12/13 17:12:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:22 client -> Sending packet 2 (1280 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:22 client -> Sending packet 3 (1280 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 1230, Data length: 283, Offset + Data length: 1513} 2025/12/13 17:12:22 client <- Reading packet 1403760820 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f841ae16ff76b3d202c4aeb69ec55f036c5b, Token: (empty), PacketNumber: 1403760820, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:22 client Received first packet. Switching destination connection ID to: f841ae16ff76b3d202c4aeb69ec55f036c5b 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:22 client newly acked packets (1): [2] 2025/12/13 17:12:22 client updated RTT: 32.0621ms (σ: 16.03105ms) 2025/12/13 17:12:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:22 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:22 client <- Reading packet 1403760821 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f841ae16ff76b3d202c4aeb69ec55f036c5b, Token: (empty), PacketNumber: 1403760821, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:22 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:22 client newly acked packets (1): [3] 2025/12/13 17:12:22 client updated RTT: 32.382ms (σ: 12.663ms) 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Parsed a coalesced packet. Part 2: 768 bytes. Remaining: 283 bytes. 2025/12/13 17:12:22 client <- Reading packet 1403760820 (768 bytes) for connection (empty), Handshake 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f841ae16ff76b3d202c4aeb69ec55f036c5b, PacketNumber: 1403760820, PacketNumberLen: 4, Length: 739, Version: v1} 2025/12/13 17:12:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/12/13 17:12:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, InitialSourceConnectionID: f841ae16ff76b3d202c4aeb69ec55f036c5b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x73429c47226cdad4c70240b59ccd4033, EnableResetStreamAt: false} 2025/12/13 17:12:22 client <- Reading packet 1403760820 (283 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1403760820, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cfc8c1d2e0baa18fcc0e2d54241f6f30076f, StatelessResetToken: 0xc5419a483777daca5358318cbbeb2eea} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e3e8685e1b8d8d020b634d3cdf8f4c0413b9, StatelessResetToken: 0xb39971ae8bdd50b80d9b0905acc38684} 2025/12/13 17:12:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, StatelessResetToken: 0x272316c00c8a6959df31ecbaad5518a6} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70 2025/12/13 17:12:22 client Long Header{Type: Initial, DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1099, Version: v1} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1403760821, LowestAcked: 1403760820, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client Long Header{Type: Handshake, DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1403760820, LowestAcked: 1403760820, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:22 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.AckFrame{LargestAcked: 1403760820, LowestAcked: 1403760820, DelayTime: 494.493µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:22 client Dropping Initial keys. 2025/12/13 17:12:22 client -> Sending packet 1 (68 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:22 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:22 client <- Reading packet 1403760821 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1403760821, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:22 client <- &wire.PingFrame{} 2025/12/13 17:12:22 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:23 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:23 client -> Sending packet 2 (53 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1403760821, LowestAcked: 1403760820, DelayTime: 25.265793ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:23 client -> Sending packet 1 (84 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, Handshake 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 client -> Sending packet 2 (84 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, Handshake 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 client <- Reading packet 1403760824 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1403760824, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.PingFrame{} 2025/12/13 17:12:23 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:23 client -> Sending packet 3 (54 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1403760824, LowestAcked: 1403760820, AckRanges: {{Largest: 1403760824, Smallest: 1403760824}, {Largest: 1403760821, Smallest: 1403760820}}, DelayTime: 62.666µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client <- Reading packet 1403760827 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1403760827, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6407dff170ddcd44baf2f58fe9eff366ffc2, StatelessResetToken: 0x579f52f3ab3c95b26b217ff5f9b233a3} 2025/12/13 17:12:23 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:23 client Dropping Handshake keys. 2025/12/13 17:12:23 client <- &wire.NewTokenFrame{Token: 0x36fb6fc2ec67d04a4cd242ace60fc2e6c20c04c3c3c3aa7b33718018f4959f41645a49b13db49ea51b} 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:23 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:23 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:23 client -> Sending packet 5 (58 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1403760827, LowestAcked: 1403760820, AckRanges: {{Largest: 1403760827, Smallest: 1403760827}, {Largest: 1403760824, Smallest: 1403760824}, {Largest: 1403760821, Smallest: 1403760820}}, DelayTime: 109.885µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:23 client Skipping packet number 4 2025/12/13 17:12:23 client -> Sending packet 6 (68 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:23 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:23 client -> Sending packet 7 (40 bytes) for connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 97090ebaa4c4e2c353fa9d33168ae2b33fb0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:23 client Connection 2f82ef39ebc95a1c52c3adcbfbe31f18ed70 closed. 2025/12/13 17:12:23 Requesting https://server4:443/arctic-savory-smartphone. 2025/12/13 17:12:23 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:23 Increased send buffer size to 14336 kiB 2025/12/13 17:12:23 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:23 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:23 Created qlog file: /logs/qlog/0ec066bf5828ca6a8450.sqlog 2025/12/13 17:12:23 client Starting new connection to server4 ([::]:57968 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0ec066bf5828ca6a8450, version v1 2025/12/13 17:12:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:23 client -> Sending packet 0 (1280 bytes) for connection 0ec066bf5828ca6a8450, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 0ec066bf5828ca6a8450, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/12/13 17:12:23 client -> Sending packet 1 (1280 bytes) for connection 0ec066bf5828ca6a8450, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 0ec066bf5828ca6a8450, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1238, Data length: 277, Offset + Data length: 1515} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client <- Reading packet 843519374 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, Token: (empty), PacketNumber: 843519374, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:23 client Received first packet. Switching destination connection ID to: e3eadd886d6eb107c4c3151caccbfa0c320d 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:23 client newly acked packets (1): [0] 2025/12/13 17:12:23 client updated RTT: 32.083083ms (σ: 16.041541ms) 2025/12/13 17:12:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:23 client -> Sending packet 2 (1280 bytes) for connection 0ec066bf5828ca6a8450, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1238, Data length: 277, Offset + Data length: 1515} 2025/12/13 17:12:23 client -> Sending packet 3 (1280 bytes) for connection 0ec066bf5828ca6a8450, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1238, Data length: 277, Offset + Data length: 1515} 2025/12/13 17:12:23 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:23 client <- Reading packet 843519376 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, Token: (empty), PacketNumber: 843519376, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Parsed a coalesced packet. Part 2: 760 bytes. Remaining: 291 bytes. 2025/12/13 17:12:23 client <- Reading packet 843519375 (760 bytes) for connection (empty), Handshake 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, PacketNumber: 843519375, PacketNumberLen: 4, Length: 731, Version: v1} 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/12/13 17:12:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0ec066bf5828ca6a8450, InitialSourceConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x30507bc44be1413a9a66ef99157684dc, EnableResetStreamAt: false} 2025/12/13 17:12:23 client <- Reading packet 843519375 (291 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 843519375, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:23 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0ec066bf5828ca6a8450 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1157, Version: v1} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 843519376, LowestAcked: 843519374, AckRanges: {{Largest: 843519376, Smallest: 843519376}, {Largest: 843519374, Smallest: 843519374}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 843519375, LowestAcked: 843519375, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 client Dropping Initial keys. 2025/12/13 17:12:23 client -> Sending packet 0 (70 bytes) for connection 0ec066bf5828ca6a8450, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/13 17:12:23 client <- Reading packet 843519377 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 843519377, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:23 client Dropping Handshake keys. 2025/12/13 17:12:23 client <- &wire.NewTokenFrame{Token: 0x360499a71e9982670ee9d76c04eb7c7720c6140ce1e8e4db93b9ba77c123ca1d5531a4cbf0fe73d9a2} 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 890, Offset + Data length: 890} 2025/12/13 17:12:23 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:23 client <- Reading packet 843519378 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 843519378, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 890, Data length: 134, Offset + Data length: 1024} 2025/12/13 17:12:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:23 client -> Sending packet 1 (50 bytes) for connection 0ec066bf5828ca6a8450, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 843519378, LowestAcked: 843519375, AckRanges: {{Largest: 843519378, Smallest: 843519377}, {Largest: 843519375, Smallest: 843519375}}, DelayTime: 55.033µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:23 client -> Sending packet 2 (40 bytes) for connection 0ec066bf5828ca6a8450, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: e3eadd886d6eb107c4c3151caccbfa0c320d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:23 client Connection 0ec066bf5828ca6a8450 closed. 2025/12/13 17:12:23 Requesting https://server4:443/disgusted-temperate-laserdisc. 2025/12/13 17:12:23 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:23 Increased send buffer size to 14336 kiB 2025/12/13 17:12:23 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:23 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:23 Created qlog file: /logs/qlog/0c127940905c3c1e648c21.sqlog 2025/12/13 17:12:23 client Starting new connection to server4 ([::]:39511 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0c127940905c3c1e648c21, version v1 2025/12/13 17:12:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:23 client -> Sending packet 0 (1280 bytes) for connection 0c127940905c3c1e648c21, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 0c127940905c3c1e648c21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 17:12:23 client -> Sending packet 1 (1280 bytes) for connection 0c127940905c3c1e648c21, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 0c127940905c3c1e648c21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:23 client <- Reading packet 1150838371 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: de5717b4bf0984804300a2f39bb652168ee1, Token: (empty), PacketNumber: 1150838371, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:23 client Received first packet. Switching destination connection ID to: de5717b4bf0984804300a2f39bb652168ee1 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:23 client newly acked packets (2): [0 1] 2025/12/13 17:12:23 client updated RTT: 34.535555ms (σ: 17.267777ms) 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Parsed a coalesced packet. Part 2: 762 bytes. Remaining: 289 bytes. 2025/12/13 17:12:23 client <- Reading packet 1150838370 (762 bytes) for connection (empty), Handshake 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: de5717b4bf0984804300a2f39bb652168ee1, PacketNumber: 1150838370, PacketNumberLen: 4, Length: 733, Version: v1} 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/12/13 17:12:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0c127940905c3c1e648c21, InitialSourceConnectionID: de5717b4bf0984804300a2f39bb652168ee1, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x4974779b628649892f9f1930d2411067, EnableResetStreamAt: false} 2025/12/13 17:12:23 client <- Reading packet 1150838370 (289 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1150838370, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c3daacb64830f139e04b71cda6127d8f0bb4, StatelessResetToken: 0x3dd7f48a91a196c2c809f031187bf736} 2025/12/13 17:12:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df2c51da9b6d4dd9e128b6f10c16a5222e52, StatelessResetToken: 0xbd7fc849a3841984bfbac7fbb08338f9} 2025/12/13 17:12:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, StatelessResetToken: 0x1635bd17534a9d1883b7bc8c1b6e2123} 2025/12/13 17:12:23 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:23 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0c127940905c3c1e648c21 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1150838371, LowestAcked: 1150838371, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1150838370, LowestAcked: 1150838370, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 client Short Header{DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1150838370, LowestAcked: 1150838370, DelayTime: 673.097µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:23 client Dropping Initial keys. 2025/12/13 17:12:23 client -> Sending packet 1 (75 bytes) for connection 0c127940905c3c1e648c21, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:23 client -> Sending packet 1 (84 bytes) for connection 0c127940905c3c1e648c21, Handshake 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 client -> Sending packet 2 (84 bytes) for connection 0c127940905c3c1e648c21, Handshake 2025/12/13 17:12:23 client Long Header{Type: Handshake, DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:23 client <- Reading packet 1150838371 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1150838371, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.PingFrame{} 2025/12/13 17:12:23 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:23 client <- Reading packet 1150838372 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1150838372, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 104.248ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client Peer doesn't await address validation any longer. 2025/12/13 17:12:23 client newly acked packets (1): [1] 2025/12/13 17:12:23 client updated RTT: 44.326ms (σ: 32.533ms) 2025/12/13 17:12:23 client ECN capability confirmed. 2025/12/13 17:12:23 client lost packet 0 (time threshold) 2025/12/13 17:12:23 client Canceling loss detection timer. 2025/12/13 17:12:23 client Dropping Handshake keys. 2025/12/13 17:12:23 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:23 client <- &wire.NewTokenFrame{Token: 0x3610cdc8c6abb41f93358520e18d12b6a39ca752373c127e0eb780aa56079b7fbae9be4e1ba4f241db} 2025/12/13 17:12:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 881, Offset + Data length: 881} 2025/12/13 17:12:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:23 client -> Sending packet 2 (54 bytes) for connection 0c127940905c3c1e648c21, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1150838372, LowestAcked: 1150838370, DelayTime: 135.994µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:23 client <- Reading packet 1150838375 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1150838375, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5ccd2e133a9781f701437ff37d0faefd9240, StatelessResetToken: 0xda7c320f347e0ee23c8bfe9e306c4063} 2025/12/13 17:12:23 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:23 client -> Sending packet 3 (54 bytes) for connection 0c127940905c3c1e648c21, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1150838375, LowestAcked: 1150838370, AckRanges: {{Largest: 1150838375, Smallest: 1150838375}, {Largest: 1150838372, Smallest: 1150838370}}, DelayTime: 59.111µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client <- Reading packet 1150838377 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1150838377, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 881, Data length: 143, Offset + Data length: 1024} 2025/12/13 17:12:23 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:23 client -> Sending packet 4 (56 bytes) for connection 0c127940905c3c1e648c21, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.AckFrame{LargestAcked: 1150838377, LowestAcked: 1150838370, AckRanges: {{Largest: 1150838377, Smallest: 1150838377}, {Largest: 1150838375, Smallest: 1150838375}, {Largest: 1150838372, Smallest: 1150838370}}, DelayTime: 89.978µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:23 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:23 client -> Sending packet 5 (40 bytes) for connection 0c127940905c3c1e648c21, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:23 client Short Header{DestConnectionID: 1ffdce585469cc721f7a3bd84857cd3afd46, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:23 client Connection 0c127940905c3c1e648c21 closed. 2025/12/13 17:12:23 Requesting https://server4:443/teal-cyan-thief. 2025/12/13 17:12:23 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:23 Increased send buffer size to 14336 kiB 2025/12/13 17:12:23 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:23 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:23 Created qlog file: /logs/qlog/9ce6dcda485fc0fd0d790195.sqlog 2025/12/13 17:12:23 client Starting new connection to server4 ([::]:43354 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ce6dcda485fc0fd0d790195, version v1 2025/12/13 17:12:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:23 client -> Sending packet 0 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 9ce6dcda485fc0fd0d790195, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 17:12:23 client -> Sending packet 1 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 9ce6dcda485fc0fd0d790195, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:23 client updated RTT: 33.312775ms (σ: 16.656387ms) 2025/12/13 17:12:23 client <- Received Retry: 2025/12/13 17:12:23 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 8b7c047d1fcf0b448f14a9fd2ebdf75f2af1, Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, Version: v1} 2025/12/13 17:12:23 client Switching destination connection ID to: 8b7c047d1fcf0b448f14a9fd2ebdf75f2af1 2025/12/13 17:12:23 client -> Sending packet 2 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 8b7c047d1fcf0b448f14a9fd2ebdf75f2af1, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:23 client -> Sending packet 3 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 8b7c047d1fcf0b448f14a9fd2ebdf75f2af1, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:23 client <- Reading packet 1885627491 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, Token: (empty), PacketNumber: 1885627491, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:23 client Received first packet. Switching destination connection ID to: 7190532a119d38f5fca3101cfe2fc2a4a37c 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/12/13 17:12:23 client newly acked packets (1): [2] 2025/12/13 17:12:23 client updated RTT: 33.191ms (σ: 12.732ms) 2025/12/13 17:12:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:23 client -> Sending packet 4 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:23 client -> Sending packet 5 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:23 client -> Sending packet 6 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:23 client -> Sending packet 7 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 7, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:23 client <- Reading packet 1885627494 (57 bytes) for connection (empty), Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, Token: (empty), PacketNumber: 1885627494, PacketNumberLen: 4, Length: 27, Version: v1} 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:23 client <- Reading packet 1885627495 (57 bytes) for connection (empty), Initial 2025/12/13 17:12:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, Token: (empty), PacketNumber: 1885627495, PacketNumberLen: 4, Length: 27, Version: v1} 2025/12/13 17:12:23 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:23 client newly acked packets (1): [7] 2025/12/13 17:12:23 client updated RTT: 33.155ms (σ: 9.62ms) 2025/12/13 17:12:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:24 client -> Sending packet 8 (1280 bytes) for connection 9ce6dcda485fc0fd0d790195, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 8, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:24 client -> &wire.PingFrame{} 2025/12/13 17:12:24 client <- Reading packet 1885627497 (57 bytes) for connection (empty), Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, Token: (empty), PacketNumber: 1885627497, PacketNumberLen: 4, Length: 27, Version: v1} 2025/12/13 17:12:24 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/12/13 17:12:24 client newly acked packets (1): [8] 2025/12/13 17:12:24 client updated RTT: 32.995ms (σ: 7.533ms) 2025/12/13 17:12:24 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:24 client <- Reading packet 1885627498 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, Token: (empty), PacketNumber: 1885627498, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Parsed a coalesced packet. Part 2: 783 bytes. Remaining: 273 bytes. 2025/12/13 17:12:24 client <- Reading packet 1885627494 (783 bytes) for connection (empty), Handshake 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, PacketNumber: 1885627494, PacketNumberLen: 4, Length: 754, Version: v1} 2025/12/13 17:12:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/12/13 17:12:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ce6dcda485fc0fd0d790195, InitialSourceConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, RetrySourceConnectionID: 8b7c047d1fcf0b448f14a9fd2ebdf75f2af1, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x4581c4d1d3a2c2576450530a46852470, EnableResetStreamAt: false} 2025/12/13 17:12:24 client <- Reading packet 1885627494 (273 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627494, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ce6dcda485fc0fd0d790195 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), Token: 0xb70bc4c5da5ee10c40b9909b4d1abeda698cd1f0cd11894810cf92e98c8f6b9e21d72b13b96070e83e423978970755b974d5eb25609415dd6bb6149c3ac2a39c71d97830ce2b8729cbfd94478a7495f239b72452ff878821544d, PacketNumber: 9, PacketNumberLen: 2, Length: 1065, Version: v1} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 1885627498, LowestAcked: 1885627491, AckRanges: {{Largest: 1885627498, Smallest: 1885627497}, {Largest: 1885627495, Smallest: 1885627494}, {Largest: 1885627491, Smallest: 1885627491}}, DelayTime: 0s} 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 69, Version: v1} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 1885627494, LowestAcked: 1885627494, DelayTime: 0s} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:24 client Dropping Initial keys. 2025/12/13 17:12:24 client -> Sending packet 0 (61 bytes) for connection 9ce6dcda485fc0fd0d790195, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:24 client Short Header{DestConnectionID: 7190532a119d38f5fca3101cfe2fc2a4a37c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 17:12:24 client <- Reading packet 1885627495 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627495, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.PingFrame{} 2025/12/13 17:12:24 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:24 client <- Reading packet 1885627497 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627497, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a46d4547dcfd2bfccf35f0371a2e1400e96b, StatelessResetToken: 0x62e6b0a13009f4d59c7b359b6439cff3} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecc0eccfe4a68094e6594cdc590916a0d672, StatelessResetToken: 0xd589a49a3db70f33bda9784ce706238d} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, StatelessResetToken: 0xe7dfc2d65454cf4a3c255e256f1782cb} 2025/12/13 17:12:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:24 client -> Sending packet 1 (53 bytes) for connection 9ce6dcda485fc0fd0d790195, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:24 client Short Header{DestConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 1885627497, LowestAcked: 1885627494, AckRanges: {{Largest: 1885627497, Smallest: 1885627497}, {Largest: 1885627495, Smallest: 1885627494}}, DelayTime: 96.671µs} 2025/12/13 17:12:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:24 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:24 client -> Sending packet 1 (84 bytes) for connection 9ce6dcda485fc0fd0d790195, Handshake 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:24 client -> Sending packet 2 (84 bytes) for connection 9ce6dcda485fc0fd0d790195, Handshake 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:24 client <- Reading packet 1885627498 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627498, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.PingFrame{} 2025/12/13 17:12:24 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:24 client <- Reading packet 1885627499 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627499, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a024e9d8c1ad82e9ef9d71926b9e39ff2a67, StatelessResetToken: 0x0aec84970403e64ede6c1004d523bde2} 2025/12/13 17:12:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:24 client -> Sending packet 2 (51 bytes) for connection 9ce6dcda485fc0fd0d790195, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:24 client Short Header{DestConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 1885627499, LowestAcked: 1885627494, AckRanges: {{Largest: 1885627499, Smallest: 1885627497}, {Largest: 1885627495, Smallest: 1885627494}}, DelayTime: 73.818µs} 2025/12/13 17:12:24 client <- Reading packet 1885627500 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627500, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 4.528ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:24 client Peer doesn't await address validation any longer. 2025/12/13 17:12:24 client newly acked packets (1): [1] 2025/12/13 17:12:24 client Ignoring all packets below 1885627498. 2025/12/13 17:12:24 client updated RTT: 33.41ms (σ: 6.481ms) 2025/12/13 17:12:24 client ECN capability confirmed. 2025/12/13 17:12:24 client lost packet 0 (time threshold) 2025/12/13 17:12:24 client Canceling loss detection timer. 2025/12/13 17:12:24 client Dropping Handshake keys. 2025/12/13 17:12:24 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:24 client <- &wire.NewTokenFrame{Token: 0x36319d208dd0413804dc24db5b7f2e38f1e7741378c524387ca2b84ee610eba64597d0dc8fea29ca1c} 2025/12/13 17:12:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:24 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:24 client -> Sending packet 3 (73 bytes) for connection 9ce6dcda485fc0fd0d790195, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:24 client Short Header{DestConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 1885627500, LowestAcked: 1885627498, DelayTime: 177.761µs} 2025/12/13 17:12:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 17:12:24 client <- Reading packet 1885627501 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1885627501, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:24 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:24 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:24 client -> Sending packet 4 (40 bytes) for connection 9ce6dcda485fc0fd0d790195, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:24 client Short Header{DestConnectionID: 943a131f54f50cb7d00998eeb9c0bb557d9d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:24 client Connection 9ce6dcda485fc0fd0d790195 closed. 2025/12/13 17:12:24 Requesting https://server4:443/olive-orange-teacher. 2025/12/13 17:12:24 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:24 Increased send buffer size to 14336 kiB 2025/12/13 17:12:24 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:24 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:24 Created qlog file: /logs/qlog/83eccf9b9d571bcd.sqlog 2025/12/13 17:12:24 client Starting new connection to server4 ([::]:59602 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 83eccf9b9d571bcd, version v1 2025/12/13 17:12:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:24 client -> Sending packet 0 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 83eccf9b9d571bcd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:24 client -> Sending packet 1 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 83eccf9b9d571bcd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 1240, Data length: 278, Offset + Data length: 1518} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:24 client updated RTT: 33.233264ms (σ: 16.616632ms) 2025/12/13 17:12:24 client <- Received Retry: 2025/12/13 17:12:24 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: c8f487cdc9c72ccca5876793530b187e589b, Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, Version: v1} 2025/12/13 17:12:24 client Switching destination connection ID to: c8f487cdc9c72ccca5876793530b187e589b 2025/12/13 17:12:24 client -> Sending packet 2 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: c8f487cdc9c72ccca5876793530b187e589b, SrcConnectionID: (empty), Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/12/13 17:12:24 client -> Sending packet 3 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: c8f487cdc9c72ccca5876793530b187e589b, SrcConnectionID: (empty), Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 1205, Data length: 35, Offset + Data length: 1240} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 1240, Data length: 278, Offset + Data length: 1518} 2025/12/13 17:12:24 client <- Reading packet 732014517 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, Token: (empty), PacketNumber: 732014517, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:24 client Received first packet. Switching destination connection ID to: 13633f4ae86298c7e112ba0d309cb2cac51b 2025/12/13 17:12:24 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/12/13 17:12:24 client newly acked packets (1): [3] 2025/12/13 17:12:24 client updated RTT: 33.228ms (σ: 12.471ms) 2025/12/13 17:12:24 client setting loss timer for packet 2 (Initial) to 37.3815ms (in %!s(monotime.Time=3615292093013)) 2025/12/13 17:12:24 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3615292093013) 2025/12/13 17:12:24 client lost packet 2 (time threshold) 2025/12/13 17:12:24 client -> Sending packet 4 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, SrcConnectionID: (empty), Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/12/13 17:12:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:24 client -> Sending packet 5 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, SrcConnectionID: (empty), Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/12/13 17:12:24 client -> Sending packet 6 (1280 bytes) for connection 83eccf9b9d571bcd, Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, SrcConnectionID: (empty), Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1138, Offset + Data length: 1205} 2025/12/13 17:12:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:24 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:24 client <- Reading packet 732014518 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, Token: (empty), PacketNumber: 732014518, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:24 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s} 2025/12/13 17:12:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 271 bytes. 2025/12/13 17:12:24 client <- Reading packet 732014517 (778 bytes) for connection (empty), Handshake 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, PacketNumber: 732014517, PacketNumberLen: 4, Length: 749, Version: v1} 2025/12/13 17:12:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/12/13 17:12:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 83eccf9b9d571bcd, InitialSourceConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, RetrySourceConnectionID: c8f487cdc9c72ccca5876793530b187e589b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x52906c70b0bc725701645ef1a787ef0c, EnableResetStreamAt: false} 2025/12/13 17:12:24 client <- Reading packet 732014517 (271 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 732014517, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e223d8f45dbbdbeb521fac60c3c3459f682f, StatelessResetToken: 0x1842590a5cff22c4b668eda587a31ccd} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d284310ac2e9ff0a90a7d401179f84f7663, StatelessResetToken: 0xed353003211bca01e2b06fb2b9cbaebd} 2025/12/13 17:12:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, StatelessResetToken: 0x144231069fa579aaa2625685dff752df} 2025/12/13 17:12:24 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 83eccf9b9d571bcd 2025/12/13 17:12:24 client Long Header{Type: Initial, DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, SrcConnectionID: (empty), Token: 0xb7108fd681dd7e3ab4d496f268b52aa547f576fe29a6910843f78280e59b06be467c6d343cef2034e04156ed63b3be33ba483ce383579423fb76ca4e1bf0036b414903c6c6dda32485d5e984a235379161335934af2355de53c9, PacketNumber: 7, PacketNumberLen: 2, Length: 1015, Version: v1} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 732014518, LowestAcked: 732014517, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 732014517, LowestAcked: 732014517, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:24 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 732014517, LowestAcked: 732014517, DelayTime: 636.348µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:24 client Dropping Initial keys. 2025/12/13 17:12:24 client -> Sending packet 1 (66 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:24 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:24 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:24 client Dropping initial packet (151 bytes) because we already dropped the keys. 2025/12/13 17:12:24 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 271 bytes. 2025/12/13 17:12:24 client <- Reading packet 732014518 (778 bytes) for connection (empty), Handshake 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 13633f4ae86298c7e112ba0d309cb2cac51b, PacketNumber: 732014518, PacketNumberLen: 4, Length: 749, Version: v1} 2025/12/13 17:12:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/12/13 17:12:24 client <- Reading packet 732014518 (271 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:24 client Short Header{DestConnectionID: (empty), PacketNumber: 732014518, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:24 client -> Sending packet 1 (56 bytes) for connection 83eccf9b9d571bcd, Handshake 2025/12/13 17:12:24 client Long Header{Type: Handshake, DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/12/13 17:12:24 client -> &wire.AckFrame{LargestAcked: 732014518, LowestAcked: 732014517, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:25 client -> Sending packet 2 (84 bytes) for connection 83eccf9b9d571bcd, Handshake 2025/12/13 17:12:25 client Long Header{Type: Handshake, DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:25 client -> Sending packet 3 (84 bytes) for connection 83eccf9b9d571bcd, Handshake 2025/12/13 17:12:25 client Long Header{Type: Handshake, DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:25 client <- Reading packet 732014519 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 732014519, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.PingFrame{} 2025/12/13 17:12:25 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:25 client <- Reading packet 732014520 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 732014520, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:25 client Dropping Handshake keys. 2025/12/13 17:12:25 client <- &wire.NewTokenFrame{Token: 0x3624f10e2b245e82dadd0cf7c756a53f6310c0b24af1a47362be1ed870fb3ba7337067b9deeddf3806} 2025/12/13 17:12:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:25 client -> Sending packet 3 (50 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.AckFrame{LargestAcked: 732014520, LowestAcked: 732014517, DelayTime: 100.127µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:25 client Skipping packet number 2 2025/12/13 17:12:25 client -> Sending packet 4 (66 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:25 client <- Reading packet 732014521 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 732014521, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.PingFrame{} 2025/12/13 17:12:25 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:25 client <- Reading packet 732014522 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 732014522, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dc26adf86b45194f6feeac1e0fe8d1fa6e6f, StatelessResetToken: 0x2b2ffa83b54178636f3f916a088be5fc} 2025/12/13 17:12:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:25 client -> Sending packet 5 (48 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.AckFrame{LargestAcked: 732014522, LowestAcked: 732014517, DelayTime: 67.436µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client <- Reading packet 732014523 (40 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 732014523, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 4.416ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client newly acked packets (1): [3] 2025/12/13 17:12:25 client Ignoring all packets below 732014521. 2025/12/13 17:12:25 client updated RTT: 33.471ms (σ: 9.84ms) 2025/12/13 17:12:25 client ECN capability confirmed. 2025/12/13 17:12:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:25 client -> Sending packet 7 (66 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:25 client -> Sending packet 8 (66 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 17:12:25 client <- Reading packet 732014524 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 732014524, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client newly acked packets (1): [8] 2025/12/13 17:12:25 client updated RTT: 33.321ms (σ: 7.678ms) 2025/12/13 17:12:25 client Canceling loss detection timer. 2025/12/13 17:12:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:25 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:25 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:25 client -> Sending packet 9 (40 bytes) for connection 83eccf9b9d571bcd, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: a8f53a2e0c49d4a4d9fe792c0578fe559513, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:25 client Connection 83eccf9b9d571bcd closed. 2025/12/13 17:12:25 Requesting https://server4:443/noisy-turquoise-mittens. 2025/12/13 17:12:25 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:25 Increased send buffer size to 14336 kiB 2025/12/13 17:12:25 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:25 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:25 Created qlog file: /logs/qlog/d7512c9f4f476fd57a963410.sqlog 2025/12/13 17:12:25 client Starting new connection to server4 ([::]:56369 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d7512c9f4f476fd57a963410, version v1 2025/12/13 17:12:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:25 client -> Sending packet 0 (1280 bytes) for connection d7512c9f4f476fd57a963410, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: d7512c9f4f476fd57a963410, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/12/13 17:12:25 client -> Sending packet 1 (1280 bytes) for connection d7512c9f4f476fd57a963410, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: d7512c9f4f476fd57a963410, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 client updated RTT: 33.233844ms (σ: 16.616922ms) 2025/12/13 17:12:25 client <- Received Retry: 2025/12/13 17:12:25 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: c4d43bb7d9b9def20650d5ee86b0288e3205, Token: 0xb7bba7fcc2b1b95ce51694b73840ea40cea4851ab2453d38c1b551e4a7ba80d67ec23c5f75eaa8923f7c295e1e08655b2264ad32077015d9cd8a42ea12bfb50563b24c6b186b1e30ec46773da56fb584b702f0cfffa669735ad2, Version: v1} 2025/12/13 17:12:25 client Switching destination connection ID to: c4d43bb7d9b9def20650d5ee86b0288e3205 2025/12/13 17:12:25 client -> Sending packet 2 (1280 bytes) for connection d7512c9f4f476fd57a963410, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: c4d43bb7d9b9def20650d5ee86b0288e3205, SrcConnectionID: (empty), Token: 0xb7bba7fcc2b1b95ce51694b73840ea40cea4851ab2453d38c1b551e4a7ba80d67ec23c5f75eaa8923f7c295e1e08655b2264ad32077015d9cd8a42ea12bfb50563b24c6b186b1e30ec46773da56fb584b702f0cfffa669735ad2, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:25 client -> Sending packet 3 (1280 bytes) for connection d7512c9f4f476fd57a963410, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: c4d43bb7d9b9def20650d5ee86b0288e3205, SrcConnectionID: (empty), Token: 0xb7bba7fcc2b1b95ce51694b73840ea40cea4851ab2453d38c1b551e4a7ba80d67ec23c5f75eaa8923f7c295e1e08655b2264ad32077015d9cd8a42ea12bfb50563b24c6b186b1e30ec46773da56fb584b702f0cfffa669735ad2, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:25 client -> Sending packet 4 (1280 bytes) for connection d7512c9f4f476fd57a963410, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: c4d43bb7d9b9def20650d5ee86b0288e3205, SrcConnectionID: (empty), Token: 0xb7bba7fcc2b1b95ce51694b73840ea40cea4851ab2453d38c1b551e4a7ba80d67ec23c5f75eaa8923f7c295e1e08655b2264ad32077015d9cd8a42ea12bfb50563b24c6b186b1e30ec46773da56fb584b702f0cfffa669735ad2, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:25 client -> Sending packet 5 (1280 bytes) for connection d7512c9f4f476fd57a963410, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: c4d43bb7d9b9def20650d5ee86b0288e3205, SrcConnectionID: (empty), Token: 0xb7bba7fcc2b1b95ce51694b73840ea40cea4851ab2453d38c1b551e4a7ba80d67ec23c5f75eaa8923f7c295e1e08655b2264ad32077015d9cd8a42ea12bfb50563b24c6b186b1e30ec46773da56fb584b702f0cfffa669735ad2, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1236, Data length: 274, Offset + Data length: 1510} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1139, Data length: 97, Offset + Data length: 1236} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:25 client <- Reading packet 1231790173 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0ce4d7dc1784ac108f18edcfced0899fbc00, Token: (empty), PacketNumber: 1231790173, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:25 client Received first packet. Switching destination connection ID to: 0ce4d7dc1784ac108f18edcfced0899fbc00 2025/12/13 17:12:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/12/13 17:12:25 client newly acked packets (2): [4 5] 2025/12/13 17:12:25 client updated RTT: 33.326ms (σ: 12.649ms) 2025/12/13 17:12:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:25 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 269 bytes. 2025/12/13 17:12:25 client <- Reading packet 1231790172 (782 bytes) for connection (empty), Handshake 2025/12/13 17:12:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0ce4d7dc1784ac108f18edcfced0899fbc00, PacketNumber: 1231790172, PacketNumberLen: 4, Length: 753, Version: v1} 2025/12/13 17:12:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/12/13 17:12:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d7512c9f4f476fd57a963410, InitialSourceConnectionID: 0ce4d7dc1784ac108f18edcfced0899fbc00, RetrySourceConnectionID: c4d43bb7d9b9def20650d5ee86b0288e3205, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x274df58016e75e363a3642491165cb7b, EnableResetStreamAt: false} 2025/12/13 17:12:25 client <- Reading packet 1231790172 (269 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1231790172, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 241cbbe307c7a700188a893e12f02bf834e6, StatelessResetToken: 0xcaaf35ff0ed6651480e13f0298410814} 2025/12/13 17:12:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 66b3e0d2f535bbc0e30f209f0c9a777a4885, StatelessResetToken: 0xdcf60b096f3b35de02e96c6f9a35ce9a} 2025/12/13 17:12:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, StatelessResetToken: 0xb0d9e33bcae76144e095d0b508e25da0} 2025/12/13 17:12:25 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d7512c9f4f476fd57a963410 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, SrcConnectionID: (empty), Token: 0xb7bba7fcc2b1b95ce51694b73840ea40cea4851ab2453d38c1b551e4a7ba80d67ec23c5f75eaa8923f7c295e1e08655b2264ad32077015d9cd8a42ea12bfb50563b24c6b186b1e30ec46773da56fb584b702f0cfffa669735ad2, PacketNumber: 6, PacketNumberLen: 2, Length: 1007, Version: v1} 2025/12/13 17:12:25 client -> &wire.AckFrame{LargestAcked: 1231790173, LowestAcked: 1231790173, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client Long Header{Type: Handshake, DestConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:25 client -> &wire.AckFrame{LargestAcked: 1231790172, LowestAcked: 1231790172, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:25 client Short Header{DestConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.AckFrame{LargestAcked: 1231790172, LowestAcked: 1231790172, DelayTime: 656.996µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:25 client Dropping Initial keys. 2025/12/13 17:12:25 client -> Sending packet 1 (69 bytes) for connection d7512c9f4f476fd57a963410, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 17:12:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:25 client <- Reading packet 1231790173 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1231790173, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.PingFrame{} 2025/12/13 17:12:25 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:25 client <- Reading packet 1231790174 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1231790174, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 320µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client Peer doesn't await address validation any longer. 2025/12/13 17:12:25 client newly acked packets (2): [0 1] 2025/12/13 17:12:25 client Ignoring all packets below 1231790173. 2025/12/13 17:12:25 client updated RTT: 33.428ms (σ: 9.691ms) 2025/12/13 17:12:25 client ECN capability confirmed. 2025/12/13 17:12:25 client Canceling loss detection timer. 2025/12/13 17:12:25 client Dropping Handshake keys. 2025/12/13 17:12:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: df866c5d3ea5d06af56082be9bbb7adbb0fd, StatelessResetToken: 0xc8311403c53eaff719c4998c33b97014} 2025/12/13 17:12:25 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:25 client <- &wire.NewTokenFrame{Token: 0x36e7fbbcba88fad7ed609f68d0c89f8b2097b3df67f14aaac6b2ec436bb1b4885c2fd8f77dff65b3cc} 2025/12/13 17:12:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:25 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:25 client -> Sending packet 2 (52 bytes) for connection d7512c9f4f476fd57a963410, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.AckFrame{LargestAcked: 1231790174, LowestAcked: 1231790173, DelayTime: 132.477µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:25 client <- Reading packet 1231790175 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1231790175, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:25 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:25 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:25 client -> Sending packet 3 (40 bytes) for connection d7512c9f4f476fd57a963410, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:25 client Short Header{DestConnectionID: cea6cef528ceb0dace83931eb7d8c102bdde, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:25 client Connection d7512c9f4f476fd57a963410 closed. 2025/12/13 17:12:25 Requesting https://server4:443/extreme-moderate-motorcycle. 2025/12/13 17:12:25 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:25 Increased send buffer size to 14336 kiB 2025/12/13 17:12:25 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:25 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:25 Created qlog file: /logs/qlog/34e4b7c0dc902dd6dedac702a7.sqlog 2025/12/13 17:12:25 client Starting new connection to server4 ([::]:38692 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 34e4b7c0dc902dd6dedac702a7, version v1 2025/12/13 17:12:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:25 client -> Sending packet 0 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 34e4b7c0dc902dd6dedac702a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/12/13 17:12:25 client -> Sending packet 1 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 34e4b7c0dc902dd6dedac702a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 17:12:25 client updated RTT: 33.268422ms (σ: 16.634211ms) 2025/12/13 17:12:25 client <- Received Retry: 2025/12/13 17:12:25 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, Version: v1} 2025/12/13 17:12:25 client Switching destination connection ID to: 0fbde7a2eef7b9ff6e879f97851263c55c49 2025/12/13 17:12:25 client -> Sending packet 2 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> Sending packet 3 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/12/13 17:12:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:25 client -> Sending packet 4 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> Sending packet 5 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:25 client -> Sending packet 6 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:25 client -> Sending packet 7 (1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Initial 2025/12/13 17:12:25 client Long Header{Type: Initial, DestConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 7, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:25 client -> &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/12/13 17:12:26 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:12:26 client <- Reading packet 1513795953 (144 bytes) for connection (empty), Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, Token: (empty), PacketNumber: 1513795953, PacketNumberLen: 4, Length: 114, Version: v1} 2025/12/13 17:12:26 client Received first packet. Switching destination connection ID to: 186ea74e09c8faa16e4bf95e25227257bce0 2025/12/13 17:12:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:26 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 274 bytes. 2025/12/13 17:12:26 client <- Reading packet 1513795951 (782 bytes) for connection (empty), Handshake 2025/12/13 17:12:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, PacketNumber: 1513795951, PacketNumberLen: 4, Length: 753, Version: v1} 2025/12/13 17:12:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/12/13 17:12:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 34e4b7c0dc902dd6dedac702a7, InitialSourceConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, RetrySourceConnectionID: 0fbde7a2eef7b9ff6e879f97851263c55c49, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xa8a00e970ef05c123393d73ee62ca214, EnableResetStreamAt: false} 2025/12/13 17:12:26 client <- Reading packet 1513795951 (274 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1513795951, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:26 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34e4b7c0dc902dd6dedac702a7 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, SrcConnectionID: (empty), Token: 0xb76f44b0cfb5c3aee3e9b0ae4835a7a1d006f903ddc65e180b3cac146c0f64c91e82a6c33140bd381831c36a68365915139a63c85fe623f19180f30e2f3a2f862de7cecf6288b7ab088b22f8b0a60b0ec6e1812eb77aaa11fdd7, PacketNumber: 8, PacketNumberLen: 2, Length: 1062, Version: v1} 2025/12/13 17:12:26 client -> &wire.AckFrame{LargestAcked: 1513795953, LowestAcked: 1513795953, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:26 client Long Header{Type: Handshake, DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:26 client -> &wire.AckFrame{LargestAcked: 1513795951, LowestAcked: 1513795951, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:26 client Dropping Initial keys. 2025/12/13 17:12:26 client -> Sending packet 0 (73 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 17:12:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:26 client -> Sending packet 1 (84 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Handshake 2025/12/13 17:12:26 client Long Header{Type: Handshake, DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:26 client -> Sending packet 2 (84 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Handshake 2025/12/13 17:12:26 client Long Header{Type: Handshake, DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:26 client <- Reading packet 1513795952 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1513795952, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:26 client <- &wire.PingFrame{} 2025/12/13 17:12:26 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:26 client <- Reading packet 1513795954 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1513795954, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 881, Data length: 143, Offset + Data length: 1024} 2025/12/13 17:12:26 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:26 client -> Sending packet 1 (54 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.AckFrame{LargestAcked: 1513795954, LowestAcked: 1513795951, AckRanges: {{Largest: 1513795954, Smallest: 1513795954}, {Largest: 1513795952, Smallest: 1513795951}}, DelayTime: 72.245µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 17:12:26 client -> Sending packet 3 (84 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Handshake 2025/12/13 17:12:26 client Long Header{Type: Handshake, DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:26 client -> Sending packet 4 (84 bytes) for connection 34e4b7c0dc902dd6dedac702a7, Handshake 2025/12/13 17:12:26 client Long Header{Type: Handshake, DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:26 client <- Reading packet 1513795955 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1513795955, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:26 client <- &wire.PingFrame{} 2025/12/13 17:12:26 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:26 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:26 client -> Sending packet 2 (55 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.AckFrame{LargestAcked: 1513795955, LowestAcked: 1513795951, AckRanges: {{Largest: 1513795955, Smallest: 1513795954}, {Largest: 1513795952, Smallest: 1513795951}}, DelayTime: 25.328983ms, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:26 client <- Reading packet 1513795956 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1513795956, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:26 client <- &wire.PingFrame{} 2025/12/13 17:12:26 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:26 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:26 client -> Sending packet 3 (55 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: 186ea74e09c8faa16e4bf95e25227257bce0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.AckFrame{LargestAcked: 1513795956, LowestAcked: 1513795951, AckRanges: {{Largest: 1513795956, Smallest: 1513795954}, {Largest: 1513795952, Smallest: 1513795951}}, DelayTime: 25.304445ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:26 client <- Reading packet 1513795958 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1513795958, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c903d0db2bf960fb53019fe42e113ab47030, StatelessResetToken: 0x6f4ad46bb2c684303f384c4457d9ff8b} 2025/12/13 17:12:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0c862ecc6d539eb4278b411abd7d1bc667af, StatelessResetToken: 0x8d3d9db8ec4f4bf5e7a2187cd5baf1e3} 2025/12/13 17:12:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b392209dc3c731ea0464f29b69a5e45ab521, StatelessResetToken: 0xe27fbce4652ed155cb73a625af562fa9} 2025/12/13 17:12:26 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:26 client Dropping Handshake keys. 2025/12/13 17:12:26 client <- &wire.NewTokenFrame{Token: 0x362defb3d4bb2a3361d49ab5f40eef67776701a5a27aec46c76fa7cf981db6f979905928ca4d2c1882} 2025/12/13 17:12:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:26 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 881, Offset + Data length: 881} 2025/12/13 17:12:26 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:26 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:26 client -> Sending packet 5 (94 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: b392209dc3c731ea0464f29b69a5e45ab521, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.AckFrame{LargestAcked: 1513795958, LowestAcked: 1513795951, AckRanges: {{Largest: 1513795958, Smallest: 1513795958}, {Largest: 1513795956, Smallest: 1513795954}, {Largest: 1513795952, Smallest: 1513795951}}, DelayTime: 201.606µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 17:12:26 client -> Sending packet 6 (75 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: b392209dc3c731ea0464f29b69a5e45ab521, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 34, Offset + Data length: 34} 2025/12/13 17:12:26 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:26 client -> Sending packet 7 (40 bytes) for connection 34e4b7c0dc902dd6dedac702a7, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:26 client Short Header{DestConnectionID: b392209dc3c731ea0464f29b69a5e45ab521, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:26 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:26 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:26 client Connection 34e4b7c0dc902dd6dedac702a7 closed. 2025/12/13 17:12:26 Requesting https://server4:443/giant-cold-jaguar. 2025/12/13 17:12:26 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:26 Increased send buffer size to 14336 kiB 2025/12/13 17:12:26 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:26 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:26 Created qlog file: /logs/qlog/c340456afca12637.sqlog 2025/12/13 17:12:26 client Starting new connection to server4 ([::]:52628 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c340456afca12637, version v1 2025/12/13 17:12:26 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:26 client -> Sending packet 0 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: c340456afca12637, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 17:12:26 client -> Sending packet 1 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: c340456afca12637, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:26 client -> Sending packet 2 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: c340456afca12637, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 17:12:26 client -> Sending packet 3 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: c340456afca12637, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:26 client <- Received Retry: 2025/12/13 17:12:26 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: aef1da4fe7ca8056d8b043c5179885179fe6, Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, Version: v1} 2025/12/13 17:12:26 client Switching destination connection ID to: aef1da4fe7ca8056d8b043c5179885179fe6 2025/12/13 17:12:26 client -> Sending packet 4 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: aef1da4fe7ca8056d8b043c5179885179fe6, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:26 client -> Sending packet 5 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:26 client Long Header{Type: Initial, DestConnectionID: aef1da4fe7ca8056d8b043c5179885179fe6, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 1139, Data length: 101, Offset + Data length: 1240} 2025/12/13 17:12:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client <- Reading packet 684399984 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, Token: (empty), PacketNumber: 684399984, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:27 client Received first packet. Switching destination connection ID to: abca7c00ad5902c0ad932a6269b520d0281e 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/12/13 17:12:27 client newly acked packets (1): [4] 2025/12/13 17:12:27 client updated RTT: 32.359114ms (σ: 16.179557ms) 2025/12/13 17:12:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:27 client -> Sending packet 6 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1139, Data length: 101, Offset + Data length: 1240} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client -> Sending packet 7 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 7, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1139, Data length: 101, Offset + Data length: 1240} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:12:27 client -> Sending packet 8 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 8, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1139, Data length: 101, Offset + Data length: 1240} 2025/12/13 17:12:27 client -> Sending packet 9 (1280 bytes) for connection c340456afca12637, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 9, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1240, Data length: 265, Offset + Data length: 1505} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1139, Data length: 101, Offset + Data length: 1240} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/12/13 17:12:27 client <- Reading packet 684399986 (151 bytes) for connection (empty), Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, Token: (empty), PacketNumber: 684399986, PacketNumberLen: 4, Length: 121, Version: v1} 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}}, DelayTime: 0s} 2025/12/13 17:12:27 client newly acked packets (1): [9] 2025/12/13 17:12:27 client updated RTT: 32.544ms (σ: 12.504ms) 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Parsed a coalesced packet. Part 2: 778 bytes. Remaining: 271 bytes. 2025/12/13 17:12:27 client <- Reading packet 684399985 (778 bytes) for connection (empty), Handshake 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, PacketNumber: 684399985, PacketNumberLen: 4, Length: 749, Version: v1} 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/12/13 17:12:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c340456afca12637, InitialSourceConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, RetrySourceConnectionID: aef1da4fe7ca8056d8b043c5179885179fe6, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd2ed7264a936d48bf088d5bddfcf8042, EnableResetStreamAt: false} 2025/12/13 17:12:27 client <- Reading packet 684399985 (271 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 684399985, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c340456afca12637 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, SrcConnectionID: (empty), Token: 0xb731b69553669c3dbb7475b357aba934e78f9c62d5ea9a87ab0f3ac89a3eb84b124f79d97b422d2ac9e42bd300b94745de6f003f19fe2b2d38efb5410c0e49d08f4959743a941e448e0cc0142ca546789fb11d798de29cadf826, PacketNumber: 10, PacketNumberLen: 2, Length: 1066, Version: v1} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 684399986, LowestAcked: 684399984, AckRanges: {{Largest: 684399986, Smallest: 684399986}, {Largest: 684399984, Smallest: 684399984}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 684399985, LowestAcked: 684399985, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:27 client Dropping Initial keys. 2025/12/13 17:12:27 client -> Sending packet 0 (63 bytes) for connection c340456afca12637, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: abca7c00ad5902c0ad932a6269b520d0281e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 17:12:27 client <- Reading packet 684399986 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 684399986, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.PingFrame{} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client <- Reading packet 684399988 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 684399988, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5565317e0e68f069e6dcfee7804533bd6ac, StatelessResetToken: 0x287b6a9437699d72adcaae4609ba0246} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5b052ba2afc5994c5bc16d9293017ed75843, StatelessResetToken: 0x379759e221aa10893377787824653bb4} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6b04bf19c723172f7277f3619dcf46d101bc, StatelessResetToken: 0xb7d862a8ad59e56fa878daba20c24c60} 2025/12/13 17:12:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:27 client -> Sending packet 1 (52 bytes) for connection c340456afca12637, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 6b04bf19c723172f7277f3619dcf46d101bc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 684399988, LowestAcked: 684399985, AckRanges: {{Largest: 684399988, Smallest: 684399988}, {Largest: 684399986, Smallest: 684399985}}, DelayTime: 98.504µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:27 client <- Reading packet 684399990 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 684399990, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 121b56520b804ea7850ab0fd33a7ef1791cb, StatelessResetToken: 0x49d376460609212469f47e71b698b853} 2025/12/13 17:12:27 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:27 client -> Sending packet 2 (52 bytes) for connection c340456afca12637, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 6b04bf19c723172f7277f3619dcf46d101bc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 684399990, LowestAcked: 684399985, AckRanges: {{Largest: 684399990, Smallest: 684399990}, {Largest: 684399988, Smallest: 684399988}, {Largest: 684399986, Smallest: 684399985}}, DelayTime: 62.607µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client <- Reading packet 684399991 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 684399991, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 4.52ms, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client Peer doesn't await address validation any longer. 2025/12/13 17:12:27 client newly acked packets (1): [1] 2025/12/13 17:12:27 client Ignoring all packets below 684399989. 2025/12/13 17:12:27 client updated RTT: 33.018ms (σ: 10.327ms) 2025/12/13 17:12:27 client ECN capability confirmed. 2025/12/13 17:12:27 client lost packet 0 (time threshold) 2025/12/13 17:12:27 client Canceling loss detection timer. 2025/12/13 17:12:27 client Dropping Handshake keys. 2025/12/13 17:12:27 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:27 client <- &wire.NewTokenFrame{Token: 0x36ddb5046a7cfbcb2e24e42a3bf151ce02d6eb782d38391905937a240060b93f5725c37b1161f39862} 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client -> Sending packet 3 (74 bytes) for connection c340456afca12637, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 6b04bf19c723172f7277f3619dcf46d101bc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 684399991, LowestAcked: 684399990, DelayTime: 158.746µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/13 17:12:27 client <- Reading packet 684399992 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 684399992, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 152µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client newly acked packets (1): [3] 2025/12/13 17:12:27 client Ignoring all packets below 684399992. 2025/12/13 17:12:27 client updated RTT: 32.882ms (σ: 8.016ms) 2025/12/13 17:12:27 client Canceling loss detection timer. 2025/12/13 17:12:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:27 client -> Sending packet 4 (40 bytes) for connection c340456afca12637, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 6b04bf19c723172f7277f3619dcf46d101bc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:27 client Connection c340456afca12637 closed. 2025/12/13 17:12:27 Requesting https://server4:443/content-scared-heatran. 2025/12/13 17:12:27 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:27 Increased send buffer size to 14336 kiB 2025/12/13 17:12:27 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:27 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:27 Created qlog file: /logs/qlog/feebbac7805e24968b4b.sqlog 2025/12/13 17:12:27 client Starting new connection to server4 ([::]:33148 -> 193.167.100.100:443), source connection ID (empty), destination connection ID feebbac7805e24968b4b, version v1 2025/12/13 17:12:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:27 client -> Sending packet 0 (1280 bytes) for connection feebbac7805e24968b4b, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: feebbac7805e24968b4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/12/13 17:12:27 client -> Sending packet 1 (1280 bytes) for connection feebbac7805e24968b4b, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: feebbac7805e24968b4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 280, Offset + Data length: 1518} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client <- Reading packet 213260451 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d8fb8a14d09aa9cc3446aebdb51761b4e609, Token: (empty), PacketNumber: 213260451, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:27 client Received first packet. Switching destination connection ID to: d8fb8a14d09aa9cc3446aebdb51761b4e609 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:27 client newly acked packets (1): [0] 2025/12/13 17:12:27 client updated RTT: 32.056459ms (σ: 16.028229ms) 2025/12/13 17:12:27 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:27 client <- Reading packet 213260452 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d8fb8a14d09aa9cc3446aebdb51761b4e609, Token: (empty), PacketNumber: 213260452, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:27 client newly acked packets (1): [1] 2025/12/13 17:12:27 client updated RTT: 32.371ms (σ: 12.651ms) 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 292 bytes. 2025/12/13 17:12:27 client <- Reading packet 213260451 (759 bytes) for connection (empty), Handshake 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d8fb8a14d09aa9cc3446aebdb51761b4e609, PacketNumber: 213260451, PacketNumberLen: 4, Length: 730, Version: v1} 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/12/13 17:12:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: feebbac7805e24968b4b, InitialSourceConnectionID: d8fb8a14d09aa9cc3446aebdb51761b4e609, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x36b43fe21d5e57efb665310cf60cd6a5, EnableResetStreamAt: false} 2025/12/13 17:12:27 client <- Reading packet 213260451 (292 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 213260451, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e0e3f7374b422b24a30548e6293c1bb9ee38, StatelessResetToken: 0x2d4c0b5e019c3740d73002e43ac02769} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 37f0583bf9d8ae1f7b110f2a31acadbc4d7a, StatelessResetToken: 0xa0cdd87efb26d912d0acfdf14629e67a} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f793958998b29dfe265de9d106f3ee659e70, StatelessResetToken: 0x6379002331541547f5bccd2a1fddab23} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection feebbac7805e24968b4b 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 213260452, LowestAcked: 213260451, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 213260451, LowestAcked: 213260451, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 213260451, LowestAcked: 213260451, DelayTime: 629.848µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:27 client Dropping Initial keys. 2025/12/13 17:12:27 client -> Sending packet 1 (68 bytes) for connection feebbac7805e24968b4b, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:27 client <- Reading packet 213260452 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 213260452, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.PingFrame{} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client <- Reading packet 213260454 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 213260454, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:27 client -> Sending packet 2 (50 bytes) for connection feebbac7805e24968b4b, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 213260454, LowestAcked: 213260451, AckRanges: {{Largest: 213260454, Smallest: 213260454}, {Largest: 213260452, Smallest: 213260451}}, DelayTime: 62.206µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client <- Reading packet 213260455 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 213260455, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.PingFrame{} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:27 client -> Sending packet 1 (84 bytes) for connection feebbac7805e24968b4b, Handshake 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:27 client -> Sending packet 2 (84 bytes) for connection feebbac7805e24968b4b, Handshake 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:27 client Sending ACK because the ACK timer expired. 2025/12/13 17:12:27 client -> Sending packet 3 (51 bytes) for connection feebbac7805e24968b4b, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 213260455, LowestAcked: 213260451, AckRanges: {{Largest: 213260455, Smallest: 213260454}, {Largest: 213260452, Smallest: 213260451}}, DelayTime: 25.404012ms, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:27 client <- Reading packet 213260458 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 213260458, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 15d61e58afe151f923d27e9ebee18dc057e1, StatelessResetToken: 0xcd3deb3effbab75fcdc3584f71100c44} 2025/12/13 17:12:27 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:27 client Dropping Handshake keys. 2025/12/13 17:12:27 client <- &wire.NewTokenFrame{Token: 0x36683331d784060065b612d461285931a6c8dc1ec12d2a87719529683193d069f0f0bd389d59c926fe} 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:27 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:27 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/13 17:12:27 client -> Sending packet 5 (54 bytes) for connection feebbac7805e24968b4b, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 213260458, LowestAcked: 213260451, AckRanges: {{Largest: 213260458, Smallest: 213260458}, {Largest: 213260455, Smallest: 213260454}, {Largest: 213260452, Smallest: 213260451}}, DelayTime: 104.865µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:27 client Skipping packet number 4 2025/12/13 17:12:27 client -> Sending packet 6 (68 bytes) for connection feebbac7805e24968b4b, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 29, Offset + Data length: 29} 2025/12/13 17:12:27 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:27 client -> Sending packet 7 (40 bytes) for connection feebbac7805e24968b4b, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: f793958998b29dfe265de9d106f3ee659e70, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:27 client Connection feebbac7805e24968b4b closed. 2025/12/13 17:12:27 Requesting https://server4:443/subtropical-enough-shorts. 2025/12/13 17:12:27 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:27 Increased send buffer size to 14336 kiB 2025/12/13 17:12:27 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:27 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:27 Created qlog file: /logs/qlog/1c8b443de3558fef.sqlog 2025/12/13 17:12:27 client Starting new connection to server4 ([::]:47384 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1c8b443de3558fef, version v1 2025/12/13 17:12:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:27 client -> Sending packet 0 (1280 bytes) for connection 1c8b443de3558fef, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 1c8b443de3558fef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:27 client -> Sending packet 1 (1280 bytes) for connection 1c8b443de3558fef, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 1c8b443de3558fef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client <- Reading packet 425578378 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 13a2924b6e3ef0cdb68f48a62faaaeae5b9f, Token: (empty), PacketNumber: 425578378, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:27 client Received first packet. Switching destination connection ID to: 13a2924b6e3ef0cdb68f48a62faaaeae5b9f 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:27 client newly acked packets (1): [0] 2025/12/13 17:12:27 client updated RTT: 32.151844ms (σ: 16.075922ms) 2025/12/13 17:12:27 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:27 client <- Reading packet 425578379 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 13a2924b6e3ef0cdb68f48a62faaaeae5b9f, Token: (empty), PacketNumber: 425578379, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:27 client newly acked packets (1): [1] 2025/12/13 17:12:27 client updated RTT: 32.454ms (σ: 12.662ms) 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 293 bytes. 2025/12/13 17:12:27 client <- Reading packet 425578378 (758 bytes) for connection (empty), Handshake 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 13a2924b6e3ef0cdb68f48a62faaaeae5b9f, PacketNumber: 425578378, PacketNumberLen: 4, Length: 729, Version: v1} 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/12/13 17:12:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1c8b443de3558fef, InitialSourceConnectionID: 13a2924b6e3ef0cdb68f48a62faaaeae5b9f, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x3535738374b1dd8255652bafb0d722d7, EnableResetStreamAt: false} 2025/12/13 17:12:27 client <- Reading packet 425578378 (293 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 425578378, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e903f36c5d85b52d6344a8aa6c3448e6b061, StatelessResetToken: 0xb534b0e802479cd9780876ee2581e25c} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0ba537768443f596572076c8475af589b11e, StatelessResetToken: 0xe9ba62854a39561df493f2b8ef82dc2e} 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, StatelessResetToken: 0xefbd6c1974f61b1068472b38ccb50d50} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1c8b443de3558fef 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 425578379, LowestAcked: 425578378, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client Long Header{Type: Handshake, DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 425578378, LowestAcked: 425578378, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:27 client Short Header{DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 425578378, LowestAcked: 425578378, DelayTime: 617.693µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:27 client Dropping Initial keys. 2025/12/13 17:12:27 client -> Sending packet 1 (71 bytes) for connection 1c8b443de3558fef, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 32, Offset + Data length: 32} 2025/12/13 17:12:27 client <- Reading packet 425578379 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 425578379, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.PingFrame{} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client <- Reading packet 425578380 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 425578380, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 312µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client Peer doesn't await address validation any longer. 2025/12/13 17:12:27 client newly acked packets (2): [0 1] 2025/12/13 17:12:27 client Ignoring all packets below 425578379. 2025/12/13 17:12:27 client updated RTT: 32.658ms (σ: 9.904ms) 2025/12/13 17:12:27 client ECN capability confirmed. 2025/12/13 17:12:27 client Canceling loss detection timer. 2025/12/13 17:12:27 client Dropping Handshake keys. 2025/12/13 17:12:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 54e74e1d41344be7ea27a49f684b3914b162, StatelessResetToken: 0x1db10522ebc336cd80bdd5262c04d238} 2025/12/13 17:12:27 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:27 client <- &wire.NewTokenFrame{Token: 0x36a85901d5601ec13acc7470c48bab5420d7fdca9b8b6628518254e364203cdcb267b539a364c252c7} 2025/12/13 17:12:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:27 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:27 client -> Sending packet 2 (48 bytes) for connection 1c8b443de3558fef, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 425578380, LowestAcked: 425578379, DelayTime: 132.518µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client <- Reading packet 425578382 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 425578382, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.PingFrame{} 2025/12/13 17:12:27 client Queuing ACK because there's a new missing packet to report. 2025/12/13 17:12:27 client -> Sending packet 3 (50 bytes) for connection 1c8b443de3558fef, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 425578382, LowestAcked: 425578379, AckRanges: {{Largest: 425578382, Smallest: 425578382}, {Largest: 425578380, Smallest: 425578379}}, DelayTime: 86.702µs, ECT0: 4, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client <- Reading packet 425578383 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 425578383, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.PingFrame{} 2025/12/13 17:12:27 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:27 client <- Reading packet 425578384 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:27 client Short Header{DestConnectionID: (empty), PacketNumber: 425578384, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:27 client -> Sending packet 4 (50 bytes) for connection 1c8b443de3558fef, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.AckFrame{LargestAcked: 425578384, LowestAcked: 425578379, AckRanges: {{Largest: 425578384, Smallest: 425578382}, {Largest: 425578380, Smallest: 425578379}}, DelayTime: 68.689µs, ECT0: 6, ECT1: 0, CE: 0} 2025/12/13 17:12:27 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:27 client -> Sending packet 5 (40 bytes) for connection 1c8b443de3558fef, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:27 client Short Header{DestConnectionID: 3fac54ef5fc7d73c3c56d1bbedf7492c6632, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:27 client Connection 1c8b443de3558fef closed. 2025/12/13 17:12:27 Requesting https://server4:443/serene-thrilled-entei. 2025/12/13 17:12:27 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:27 Increased send buffer size to 14336 kiB 2025/12/13 17:12:27 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:27 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:27 Created qlog file: /logs/qlog/2ebc71e23bc8b26a110c.sqlog 2025/12/13 17:12:27 client Starting new connection to server4 ([::]:40299 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2ebc71e23bc8b26a110c, version v1 2025/12/13 17:12:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:27 client -> Sending packet 0 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 2ebc71e23bc8b26a110c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/12/13 17:12:27 client -> Sending packet 1 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 2ebc71e23bc8b26a110c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 278, Offset + Data length: 1516} 2025/12/13 17:12:27 client updated RTT: 33.206905ms (σ: 16.603452ms) 2025/12/13 17:12:27 client <- Received Retry: 2025/12/13 17:12:27 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 34b69bb851ed3c0fcb56f7a1abf1def2e48e, Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, Version: v1} 2025/12/13 17:12:27 client Switching destination connection ID to: 34b69bb851ed3c0fcb56f7a1abf1def2e48e 2025/12/13 17:12:27 client -> Sending packet 2 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 34b69bb851ed3c0fcb56f7a1abf1def2e48e, SrcConnectionID: (empty), Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:27 client -> Sending packet 3 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 34b69bb851ed3c0fcb56f7a1abf1def2e48e, SrcConnectionID: (empty), Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 278, Offset + Data length: 1516} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/12/13 17:12:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:12:27 client -> Sending packet 4 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 34b69bb851ed3c0fcb56f7a1abf1def2e48e, SrcConnectionID: (empty), Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, PacketNumber: 4, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:27 client -> Sending packet 5 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:27 client Long Header{Type: Initial, DestConnectionID: 34b69bb851ed3c0fcb56f7a1abf1def2e48e, SrcConnectionID: (empty), Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, PacketNumber: 5, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 278, Offset + Data length: 1516} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:27 client -> &wire.CryptoFrame{Offset: 1139, Data length: 99, Offset + Data length: 1238} 2025/12/13 17:12:28 client <- Reading packet 2109236722 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd6bdac9c7274a9e9a0cbdd7d22d7358d33e, Token: (empty), PacketNumber: 2109236722, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:28 client Received first packet. Switching destination connection ID to: dd6bdac9c7274a9e9a0cbdd7d22d7358d33e 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/12/13 17:12:28 client newly acked packets (1): [5] 2025/12/13 17:12:28 client updated RTT: 33.215ms (σ: 12.47ms) 2025/12/13 17:12:28 client setting loss timer for packet 4 (Initial) to 37.440612ms (in %!s(monotime.Time=3618469335468)) 2025/12/13 17:12:28 client Loss detection alarm fired in loss timer mode. Loss time: %!s(monotime.Time=3618469335468) 2025/12/13 17:12:28 client lost packet 4 (time threshold) 2025/12/13 17:12:28 client -> Sending packet 6 (1280 bytes) for connection 2ebc71e23bc8b26a110c, Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: dd6bdac9c7274a9e9a0cbdd7d22d7358d33e, SrcConnectionID: (empty), Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, PacketNumber: 6, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:28 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:28 client <- Reading packet 2109236723 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd6bdac9c7274a9e9a0cbdd7d22d7358d33e, Token: (empty), PacketNumber: 2109236723, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s} 2025/12/13 17:12:28 client newly acked packets (1): [6] 2025/12/13 17:12:28 client updated RTT: 33.321ms (σ: 9.566ms) 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Parsed a coalesced packet. Part 2: 780 bytes. Remaining: 271 bytes. 2025/12/13 17:12:28 client <- Reading packet 2109236722 (780 bytes) for connection (empty), Handshake 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dd6bdac9c7274a9e9a0cbdd7d22d7358d33e, PacketNumber: 2109236722, PacketNumberLen: 4, Length: 751, Version: v1} 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/12/13 17:12:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2ebc71e23bc8b26a110c, InitialSourceConnectionID: dd6bdac9c7274a9e9a0cbdd7d22d7358d33e, RetrySourceConnectionID: 34b69bb851ed3c0fcb56f7a1abf1def2e48e, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x865365a1db1d0e45c0170e298aed336c, EnableResetStreamAt: false} 2025/12/13 17:12:28 client <- Reading packet 2109236722 (271 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2109236722, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 46825c83182e73a521253ba70874a5833d69, StatelessResetToken: 0xc94894c0824b0beb8a74495a415e5804} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 861691a7ee777b8fb8bf839a96023f456f78, StatelessResetToken: 0x923829db9f9f5c388c627890b08d4bc2} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 978cb586727a021565d0b2317448f47b694a, StatelessResetToken: 0x5deb39f8011cc0ab7f420e89e7d97d18} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2ebc71e23bc8b26a110c 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: 978cb586727a021565d0b2317448f47b694a, SrcConnectionID: (empty), Token: 0xb7e8beb3ed3fc7a892d6927a57b6648ca47326dea3f90970af7c72d2b2a3c9882404c2dc05956a813b65189c4c01718e8bbf5c6d861969dbc5c0421df4300963126f2fe5922c5ccf9a507004af6ea0b7dbf1ab73eafe29ac86fc, PacketNumber: 7, PacketNumberLen: 2, Length: 1007, Version: v1} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 2109236723, LowestAcked: 2109236722, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: 978cb586727a021565d0b2317448f47b694a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 2109236722, LowestAcked: 2109236722, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:28 client Short Header{DestConnectionID: 978cb586727a021565d0b2317448f47b694a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 2109236722, LowestAcked: 2109236722, DelayTime: 687.934µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:28 client Dropping Initial keys. 2025/12/13 17:12:28 client -> Sending packet 1 (67 bytes) for connection 2ebc71e23bc8b26a110c, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: 978cb586727a021565d0b2317448f47b694a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/12/13 17:12:28 client <- Reading packet 2109236723 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2109236723, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.PingFrame{} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client <- Reading packet 2109236725 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2109236725, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:28 client -> Sending packet 2 (54 bytes) for connection 2ebc71e23bc8b26a110c, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: 978cb586727a021565d0b2317448f47b694a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 2109236725, LowestAcked: 2109236722, AckRanges: {{Largest: 2109236725, Smallest: 2109236725}, {Largest: 2109236723, Smallest: 2109236722}}, DelayTime: 63.709µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client <- Reading packet 2109236726 (1444 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2109236726, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.PingFrame{} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:12:28 client -> Sending packet 1 (84 bytes) for connection 2ebc71e23bc8b26a110c, Handshake 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: 978cb586727a021565d0b2317448f47b694a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:28 client -> Sending packet 2 (84 bytes) for connection 2ebc71e23bc8b26a110c, Handshake 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: 978cb586727a021565d0b2317448f47b694a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:28 client <- Reading packet 2109236727 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2109236727, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 80ec7016ce25e12e9b21d632270168025f1d, StatelessResetToken: 0x8bd50141c89aed378d4df288f397b632} 2025/12/13 17:12:28 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:28 client Dropping Handshake keys. 2025/12/13 17:12:28 client <- &wire.NewTokenFrame{Token: 0x369fc2d279359e160b0d19300a540bc6094af1b1f09d132368b32f5074f4930e70063dee6127fc167b} 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:28 client -> Sending packet 3 (54 bytes) for connection 2ebc71e23bc8b26a110c, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: 978cb586727a021565d0b2317448f47b694a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 2109236727, LowestAcked: 2109236722, AckRanges: {{Largest: 2109236727, Smallest: 2109236725}, {Largest: 2109236723, Smallest: 2109236722}}, DelayTime: 100.899µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:28 client -> Sending packet 4 (40 bytes) for connection 2ebc71e23bc8b26a110c, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: 978cb586727a021565d0b2317448f47b694a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:28 client Connection 2ebc71e23bc8b26a110c closed. 2025/12/13 17:12:28 Requesting https://server4:443/unlimited-slow-knight. 2025/12/13 17:12:28 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:28 Increased send buffer size to 14336 kiB 2025/12/13 17:12:28 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:28 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:28 Created qlog file: /logs/qlog/343a9676eaab34efce6635.sqlog 2025/12/13 17:12:28 client Starting new connection to server4 ([::]:33563 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 343a9676eaab34efce6635, version v1 2025/12/13 17:12:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:28 client -> Sending packet 0 (1280 bytes) for connection 343a9676eaab34efce6635, Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: 343a9676eaab34efce6635, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:28 client -> Sending packet 1 (1280 bytes) for connection 343a9676eaab34efce6635, Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: 343a9676eaab34efce6635, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:28 client <- Reading packet 1583825823 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28c5ac4e287742909f1aa2d0a98a4b794e5b, Token: (empty), PacketNumber: 1583825823, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:28 client Received first packet. Switching destination connection ID to: 28c5ac4e287742909f1aa2d0a98a4b794e5b 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:28 client newly acked packets (1): [0] 2025/12/13 17:12:28 client updated RTT: 32.182984ms (σ: 16.091492ms) 2025/12/13 17:12:28 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:28 client <- Reading packet 1583825824 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28c5ac4e287742909f1aa2d0a98a4b794e5b, Token: (empty), PacketNumber: 1583825824, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:28 client newly acked packets (1): [1] 2025/12/13 17:12:28 client updated RTT: 32.496ms (σ: 12.696ms) 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Parsed a coalesced packet. Part 2: 761 bytes. Remaining: 290 bytes. 2025/12/13 17:12:28 client <- Reading packet 1583825823 (761 bytes) for connection (empty), Handshake 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28c5ac4e287742909f1aa2d0a98a4b794e5b, PacketNumber: 1583825823, PacketNumberLen: 4, Length: 732, Version: v1} 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/12/13 17:12:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 343a9676eaab34efce6635, InitialSourceConnectionID: 28c5ac4e287742909f1aa2d0a98a4b794e5b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x23f107ff2ca514d52b5b6357633fdce9, EnableResetStreamAt: false} 2025/12/13 17:12:28 client <- Reading packet 1583825823 (290 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1583825823, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 913ea1e1b4df44b8b3379fe2164c3171dab4, StatelessResetToken: 0xf6dd0048f9f2eebb53e76d90f398b1ee} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff552c7ad0faed18d61c4aa96a5e5ff8490b, StatelessResetToken: 0x20f7432b09d4e6cd236280370d65e048} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe6f34127eb6e70e76728d1163428c617050, StatelessResetToken: 0xdc08f1e9720da0aa8a1feef7385559f6} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 343a9676eaab34efce6635 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: fe6f34127eb6e70e76728d1163428c617050, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 1583825824, LowestAcked: 1583825823, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: fe6f34127eb6e70e76728d1163428c617050, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 1583825823, LowestAcked: 1583825823, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:28 client Short Header{DestConnectionID: fe6f34127eb6e70e76728d1163428c617050, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 1583825823, LowestAcked: 1583825823, DelayTime: 668.477µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:28 client Dropping Initial keys. 2025/12/13 17:12:28 client -> Sending packet 1 (67 bytes) for connection 343a9676eaab34efce6635, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: fe6f34127eb6e70e76728d1163428c617050, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 28, Offset + Data length: 28} 2025/12/13 17:12:28 client <- Reading packet 1583825824 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1583825824, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.PingFrame{} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client <- Reading packet 1583825825 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1583825825, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 344µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client Peer doesn't await address validation any longer. 2025/12/13 17:12:28 client newly acked packets (2): [0 1] 2025/12/13 17:12:28 client Ignoring all packets below 1583825824. 2025/12/13 17:12:28 client updated RTT: 32.69ms (σ: 9.91ms) 2025/12/13 17:12:28 client ECN capability confirmed. 2025/12/13 17:12:28 client Canceling loss detection timer. 2025/12/13 17:12:28 client Dropping Handshake keys. 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f7a76030109698d6ee7894b2a3716927b804, StatelessResetToken: 0xd1e5901357c09d01cb2db899d50bb980} 2025/12/13 17:12:28 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:28 client <- &wire.NewTokenFrame{Token: 0x36e7d82df4501ab60a153f904bcbcdf31c06cf38e848bc7926b0c0db42f639b7e85a35d391bee585c7} 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:28 client -> Sending packet 2 (52 bytes) for connection 343a9676eaab34efce6635, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: fe6f34127eb6e70e76728d1163428c617050, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 1583825825, LowestAcked: 1583825824, DelayTime: 146.994µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client <- Reading packet 1583825826 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1583825826, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:28 client -> Sending packet 3 (40 bytes) for connection 343a9676eaab34efce6635, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: fe6f34127eb6e70e76728d1163428c617050, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:28 client Connection 343a9676eaab34efce6635 closed. 2025/12/13 17:12:28 Requesting https://server4:443/bored-bountiful-cheetah. 2025/12/13 17:12:28 Increased receive buffer size to 14336 kiB 2025/12/13 17:12:28 Increased send buffer size to 14336 kiB 2025/12/13 17:12:28 Setting DF for IPv4 and IPv6. 2025/12/13 17:12:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:12:28 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:12:28 Created qlog file: /logs/qlog/5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6.sqlog 2025/12/13 17:12:28 client Starting new connection to server4 ([::]:60409 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, version v1 2025/12/13 17:12:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:12:28 client -> Sending packet 0 (1280 bytes) for connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:12:28 client -> Sending packet 1 (1280 bytes) for connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 1228, Data length: 285, Offset + Data length: 1513} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:12:28 client <- Reading packet 139275345 (55 bytes) for connection (empty), Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2ee7d914f8bf22fd0d4a0a1f5c86ab111ec, Token: (empty), PacketNumber: 139275345, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:12:28 client Received first packet. Switching destination connection ID to: c2ee7d914f8bf22fd0d4a0a1f5c86ab111ec 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:28 client newly acked packets (1): [0] 2025/12/13 17:12:28 client updated RTT: 32.001163ms (σ: 16.000581ms) 2025/12/13 17:12:28 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:12:28 client <- Reading packet 139275346 (149 bytes) for connection (empty), Initial 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2ee7d914f8bf22fd0d4a0a1f5c86ab111ec, Token: (empty), PacketNumber: 139275346, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:12:28 client newly acked packets (1): [1] 2025/12/13 17:12:28 client updated RTT: 32.312ms (σ: 12.623ms) 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:12:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 281 bytes. 2025/12/13 17:12:28 client <- Reading packet 139275345 (770 bytes) for connection (empty), Handshake 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c2ee7d914f8bf22fd0d4a0a1f5c86ab111ec, PacketNumber: 139275345, PacketNumberLen: 4, Length: 741, Version: v1} 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/12/13 17:12:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:12:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, InitialSourceConnectionID: c2ee7d914f8bf22fd0d4a0a1f5c86ab111ec, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x7130bb7726293814e74bdf674446bed9, EnableResetStreamAt: false} 2025/12/13 17:12:28 client <- Reading packet 139275345 (281 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 139275345, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8e0844fc05a19d9daa9bbc00b1cf293b9c96, StatelessResetToken: 0xd13cf4fb98248cdf64e302710dc1b400} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 014c88efd7e3592e6fc82c0707ac647ae8e8, StatelessResetToken: 0xe842ca5ea7e043a8e803b5f2e855800e} 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, StatelessResetToken: 0xcecf18e123601217d97955b5c49fbce1} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6 2025/12/13 17:12:28 client Long Header{Type: Initial, DestConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1107, Version: v1} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 139275346, LowestAcked: 139275345, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client Long Header{Type: Handshake, DestConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 68, Version: v1} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 139275345, LowestAcked: 139275345, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:12:28 client Short Header{DestConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 139275345, LowestAcked: 139275345, DelayTime: 490.535µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:12:28 client Dropping Initial keys. 2025/12/13 17:12:28 client -> Sending packet 1 (69 bytes) for connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 30, Offset + Data length: 30} 2025/12/13 17:12:28 client <- Reading packet 139275346 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 139275346, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.PingFrame{} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client <- Reading packet 139275347 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 139275347, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 392µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client Peer doesn't await address validation any longer. 2025/12/13 17:12:28 client newly acked packets (2): [0 1] 2025/12/13 17:12:28 client Ignoring all packets below 139275346. 2025/12/13 17:12:28 client updated RTT: 32.542ms (σ: 9.927ms) 2025/12/13 17:12:28 client ECN capability confirmed. 2025/12/13 17:12:28 client Canceling loss detection timer. 2025/12/13 17:12:28 client Dropping Handshake keys. 2025/12/13 17:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: da62f963c3778091448d4c637ff5eba0379f, StatelessResetToken: 0x6647f409d3f1841d374b99fac37d48fa} 2025/12/13 17:12:28 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:12:28 client <- &wire.NewTokenFrame{Token: 0x369b01f385aa0c5da8a3486a5b180eefd7bba002a0d0d9bd15bcad45774e37ea088e3606b6f6cb094a} 2025/12/13 17:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:12:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:12:28 client -> Sending packet 2 (48 bytes) for connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.AckFrame{LargestAcked: 139275347, LowestAcked: 139275346, DelayTime: 164.697µs, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:12:28 client <- Reading packet 139275348 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 139275348, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:12:28 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:12:28 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:12:28 client -> Sending packet 3 (40 bytes) for connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6, 1-RTT (ECN: ECT(0)) 2025/12/13 17:12:28 client Short Header{DestConnectionID: e549118ebd65e5ba2b701b0e93a20f2d12d4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:12:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:12:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:12:28 client Connection 5d23ebc4a8c0b0a6c43691a68cab7f45925e3fc6 closed.