2025/12/13 17:09:11 Requesting https://server4:443/shy-tart-laptop. 2025/12/13 17:09:11 Increased receive buffer size to 14336 kiB 2025/12/13 17:09:11 Increased send buffer size to 14336 kiB 2025/12/13 17:09:11 Setting DF for IPv4 and IPv6. 2025/12/13 17:09:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 17:09:11 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 17:09:11 Created qlog file: /logs/qlog/64a34d4ff0f03382e2.sqlog 2025/12/13 17:09:11 client Starting new connection to server4 ([::]:33807 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 64a34d4ff0f03382e2, version v1 2025/12/13 17:09:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/13 17:09:11 client -> Sending packet 0 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:11 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:09:11 client -> Sending packet 1 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:11 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:09:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/13 17:09:11 client -> Sending packet 2 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:11 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:09:11 client -> Sending packet 3 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:11 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/12/13 17:09:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/13 17:09:11 client -> Sending packet 4 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:11 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:09:11 client -> Sending packet 5 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:11 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:09:11 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/12/13 17:09:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/12/13 17:09:12 client -> Sending packet 6 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:12 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 17:09:12 client -> Sending packet 7 (1280 bytes) for connection 64a34d4ff0f03382e2, Initial 2025/12/13 17:09:12 client Long Header{Type: Initial, DestConnectionID: 64a34d4ff0f03382e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/12/13 17:09:12 client <- Reading packet 1686504894 (55 bytes) for connection (empty), Initial 2025/12/13 17:09:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ce7830ca109ee76d06e39b38e220013a29de, Token: (empty), PacketNumber: 1686504894, PacketNumberLen: 4, Length: 25, Version: v1} 2025/12/13 17:09:12 client Received first packet. Switching destination connection ID to: ce7830ca109ee76d06e39b38e220013a29de 2025/12/13 17:09:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:09:12 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:09:12 client <- Reading packet 1686504895 (149 bytes) for connection (empty), Initial 2025/12/13 17:09:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ce7830ca109ee76d06e39b38e220013a29de, Token: (empty), PacketNumber: 1686504895, PacketNumberLen: 4, Length: 119, Version: v1} 2025/12/13 17:09:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 17:09:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/13 17:09:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:09:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:09:12 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 294 bytes. 2025/12/13 17:09:12 client <- Reading packet 1686504894 (757 bytes) for connection (empty), Handshake 2025/12/13 17:09:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ce7830ca109ee76d06e39b38e220013a29de, PacketNumber: 1686504894, PacketNumberLen: 4, Length: 728, Version: v1} 2025/12/13 17:09:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/12/13 17:09:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:09:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 17:09:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 64a34d4ff0f03382e2, InitialSourceConnectionID: ce7830ca109ee76d06e39b38e220013a29de, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xc51d17a6c670bac99524a86b0ff301b1, EnableResetStreamAt: false} 2025/12/13 17:09:12 client <- Reading packet 1686504894 (294 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504894, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:09:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 94062c7db60fb827139f4989325d2f90d501, StatelessResetToken: 0x4015acecf544423321be2730c2072df0} 2025/12/13 17:09:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 96410eb3334ce4299b81129e8aaa9accdaf8, StatelessResetToken: 0x54d6b61f4c8c5f15953db52debee84c3} 2025/12/13 17:09:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fbc69b93ca627317b997b8653a0648ca3139, StatelessResetToken: 0x8c9f9ac07dac8a388379807af2597b3e} 2025/12/13 17:09:12 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:09:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 64a34d4ff0f03382e2 2025/12/13 17:09:12 client Long Header{Type: Initial, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1098, Version: v1} 2025/12/13 17:09:12 client -> &wire.AckFrame{LargestAcked: 1686504895, LowestAcked: 1686504894, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:09:12 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 72, Version: v1} 2025/12/13 17:09:12 client -> &wire.AckFrame{LargestAcked: 1686504894, LowestAcked: 1686504894, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:12 client Short Header{DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:09:12 client -> &wire.AckFrame{LargestAcked: 1686504894, LowestAcked: 1686504894, DelayTime: 773.243µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:09:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 17:09:12 client Dropping Initial keys. 2025/12/13 17:09:12 client -> Sending packet 1 (61 bytes) for connection 64a34d4ff0f03382e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:09:12 client Short Header{DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:09:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 22, Offset + Data length: 22} 2025/12/13 17:09:12 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/12/13 17:09:12 client Dropping initial packet (149 bytes) because we already dropped the keys. 2025/12/13 17:09:12 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 294 bytes. 2025/12/13 17:09:12 client <- Reading packet 1686504895 (757 bytes) for connection (empty), Handshake 2025/12/13 17:09:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ce7830ca109ee76d06e39b38e220013a29de, PacketNumber: 1686504895, PacketNumberLen: 4, Length: 728, Version: v1} 2025/12/13 17:09:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/12/13 17:09:12 client <- Reading packet 1686504895 (294 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504895, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:09:12 client Dropping initial packet (55 bytes) because we already dropped the keys. 2025/12/13 17:09:12 client -> Sending packet 1 (60 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:12 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 17:09:12 client -> &wire.AckFrame{LargestAcked: 1686504895, LowestAcked: 1686504894, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 17:09:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/13 17:09:12 client -> Sending packet 2 (84 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:12 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:12 client -> Sending packet 3 (84 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:12 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:09:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:13 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:09:13 client Dropping initial packet (144 bytes) because we already dropped the keys. 2025/12/13 17:09:13 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 299 bytes. 2025/12/13 17:09:13 client <- Reading packet 1686504896 (757 bytes) for connection (empty), Handshake 2025/12/13 17:09:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ce7830ca109ee76d06e39b38e220013a29de, PacketNumber: 1686504896, PacketNumberLen: 4, Length: 728, Version: v1} 2025/12/13 17:09:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/12/13 17:09:13 client <- Reading packet 1686504896 (299 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504896, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:09:13 client <- &wire.PingFrame{} 2025/12/13 17:09:13 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:09:13 client -> Sending packet 4 (60 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:13 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 17:09:13 client -> &wire.AckFrame{LargestAcked: 1686504896, LowestAcked: 1686504894, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:09:13 client Sending ACK because the ACK timer expired. 2025/12/13 17:09:13 client -> Sending packet 2 (53 bytes) for connection 64a34d4ff0f03382e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:09:13 client Short Header{DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:09:13 client -> &wire.AckFrame{LargestAcked: 1686504896, LowestAcked: 1686504894, DelayTime: 25.399214ms, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:09:13 client Dropping initial packet (55 bytes) because we already dropped the keys. 2025/12/13 17:09:13 client Dropping initial packet (55 bytes) because we already dropped the keys. 2025/12/13 17:09:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/13 17:09:13 client -> Sending packet 5 (84 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:13 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:09:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:13 client -> Sending packet 6 (84 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:13 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:09:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:13 client Parsed a coalesced packet. Part 1: 144 bytes. Remaining: 1056 bytes. 2025/12/13 17:09:13 client Dropping initial packet (144 bytes) because we already dropped the keys. 2025/12/13 17:09:13 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 299 bytes. 2025/12/13 17:09:13 client <- Reading packet 1686504897 (757 bytes) for connection (empty), Handshake 2025/12/13 17:09:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ce7830ca109ee76d06e39b38e220013a29de, PacketNumber: 1686504897, PacketNumberLen: 4, Length: 728, Version: v1} 2025/12/13 17:09:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/12/13 17:09:13 client <- Reading packet 1686504897 (299 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504897, PacketNumberLen: 4, KeyPhase: 0} 2025/12/13 17:09:13 client -> Sending packet 7 (60 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:13 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 33, Version: v1} 2025/12/13 17:09:13 client -> &wire.AckFrame{LargestAcked: 1686504897, LowestAcked: 1686504894, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/12/13 17:09:14 client Dropping initial packet (55 bytes) because we already dropped the keys. 2025/12/13 17:09:14 client Dropping initial packet (55 bytes) because we already dropped the keys. 2025/12/13 17:09:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/12/13 17:09:14 client -> Sending packet 8 (84 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:14 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:09:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:14 client -> Sending packet 9 (84 bytes) for connection 64a34d4ff0f03382e2, Handshake 2025/12/13 17:09:14 client Long Header{Type: Handshake, DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/13 17:09:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 17:09:14 client <- Reading packet 1686504898 (1406 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504898, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:09:14 client <- &wire.PingFrame{} 2025/12/13 17:09:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:09:14 client <- Reading packet 1686504899 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504899, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:09:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 376µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 17:09:14 client Peer doesn't await address validation any longer. 2025/12/13 17:09:14 client newly acked packets (2): [0 1] 2025/12/13 17:09:14 client Ignoring all packets below 1686504895. 2025/12/13 17:09:14 client updated RTT: 1.504683716s (σ: 752.341858ms) 2025/12/13 17:09:14 client ECN capability confirmed. 2025/12/13 17:09:14 client Canceling loss detection timer. 2025/12/13 17:09:14 client Dropping Handshake keys. 2025/12/13 17:09:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8523da54e91cd721bf6d639bda0eb23f491c, StatelessResetToken: 0x30b68bfb2939b4f86722c8d38374eaf4} 2025/12/13 17:09:14 client <- &wire.HandshakeDoneFrame{} 2025/12/13 17:09:14 client <- &wire.NewTokenFrame{Token: 0x360886cca0cfa5f66743d16cf1c09f570d3248e4c0275697c285177795d5191846bb80dcccb42071a1} 2025/12/13 17:09:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/12/13 17:09:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/12/13 17:09:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 17:09:14 client -> Sending packet 3 (52 bytes) for connection 64a34d4ff0f03382e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:09:14 client Short Header{DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:09:14 client -> &wire.AckFrame{LargestAcked: 1686504899, LowestAcked: 1686504895, DelayTime: 141.774µs, ECT0: 5, ECT1: 0, CE: 0} 2025/12/13 17:09:14 client <- Reading packet 1686504900 (1200 bytes) for connection (empty), 1-RTT 2025/12/13 17:09:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1686504900, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 17:09:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 847, Data length: 177, Offset + Data length: 1024} 2025/12/13 17:09:14 client Setting ACK timer to max ack delay: 25ms 2025/12/13 17:09:14 client Closing connection with error: Application error 0x0 (local) 2025/12/13 17:09:14 client -> Sending packet 4 (40 bytes) for connection 64a34d4ff0f03382e2, 1-RTT (ECN: ECT(0)) 2025/12/13 17:09:14 client Short Header{DestConnectionID: fbc69b93ca627317b997b8653a0648ca3139, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 17:09:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 17:09:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/13 17:09:14 client Connection 64a34d4ff0f03382e2 closed.