2025/09/12 03:52:59 Requesting https://server4:443/litwwwxzpa. 2025/09/12 03:52:59 Increased receive buffer size to 14336 kiB 2025/09/12 03:52:59 Increased send buffer size to 14336 kiB 2025/09/12 03:52:59 Setting DF for IPv4 and IPv6. 2025/09/12 03:52:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:52:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:52:59 Created qlog file: /logs/qlog/831c7a487ca0c7d1e326879dc6e2216ac00c4d32.sqlog 2025/09/12 03:52:59 client Starting new connection to server4 ([::]:49049 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, version v1 2025/09/12 03:52:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:52:59 client -> Sending packet 0 (1280 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:52:59 client -> Sending packet 1 (1280 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 1228, Data length: 292, Offset + Data length: 1520} 2025/09/12 03:52:59 client <- Reading packet 467410058 (55 bytes) for connection (empty), Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4c5c10cb8453358de399bdf675d93475891b, Token: (empty), PacketNumber: 467410058, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:52:59 client Received first packet. Switching destination connection ID to: 4c5c10cb8453358de399bdf675d93475891b 2025/09/12 03:52:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:52:59 client newly acked packets (1): [0] 2025/09/12 03:52:59 client updated RTT: 37.44062ms (σ: 18.72031ms) 2025/09/12 03:52:59 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/12 03:52:59 client <- Reading packet 467410059 (149 bytes) for connection (empty), Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4c5c10cb8453358de399bdf675d93475891b, Token: (empty), PacketNumber: 467410059, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:52:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:52:59 client newly acked packets (1): [1] 2025/09/12 03:52:59 client updated RTT: 37.708ms (σ: 14.576ms) 2025/09/12 03:52:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:52:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Parsed a coalesced packet. Part 2: 770 bytes. Remaining: 281 bytes. 2025/09/12 03:52:59 client <- Reading packet 467410058 (770 bytes) for connection (empty), Handshake 2025/09/12 03:52:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4c5c10cb8453358de399bdf675d93475891b, PacketNumber: 467410058, PacketNumberLen: 4, Length: 741, Version: v1} 2025/09/12 03:52:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/09/12 03:52:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, InitialSourceConnectionID: 4c5c10cb8453358de399bdf675d93475891b, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0xd45d9318a2817f0571156484692983eb, EnableResetStreamAt: false} 2025/09/12 03:52:59 client <- Reading packet 467410058 (281 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410058, PacketNumberLen: 4, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f243fb96ac821e209ceb2ba61101954626d3, StatelessResetToken: 0x8e40ece3394d1eedd5fd5348af3333da} 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: edeaa64cc367494ca2dabef0fc52ea8af578, StatelessResetToken: 0x56d78b395edc63646070504fc428d23a} 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, StatelessResetToken: 0xaec0d995788e387310541f4620fae55c} 2025/09/12 03:52:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:52:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 467410059, LowestAcked: 467410058, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Long Header{Type: Handshake, DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:52:59 client Dropping Initial keys. 2025/09/12 03:52:59 client -> Sending packet 1 (112 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, Handshake 2025/09/12 03:52:59 client Long Header{Type: Handshake, DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 467410058, LowestAcked: 467410058, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:52:59 client -> Sending packet 2 (49 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 467410058, LowestAcked: 467410058, DelayTime: 876.046µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 467410059 (1406 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410059, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.PingFrame{} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 467410060 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410060, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 240µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Peer doesn't await address validation any longer. 2025/09/12 03:52:59 client newly acked packets (2): [0 1] 2025/09/12 03:52:59 client Canceling loss detection timer. 2025/09/12 03:52:59 client Dropping Handshake keys. 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5f59a19a1d12f61997ab75b0071e3c533ccb, StatelessResetToken: 0x441ed52d669044833603f0228f108ed5} 2025/09/12 03:52:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:52:59 client <- &wire.NewTokenFrame{Token: 0x364b0efd842253c7640c47af2cd5808dd65c92beabe56badb747a64264dc2ff15367ebdf172e641b9e} 2025/09/12 03:52:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 3 (48 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 467410060, LowestAcked: 467410058, DelayTime: 173.472µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 467410061 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410061, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 847, Data length: 1176, Offset + Data length: 2023} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 467410062 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410062, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2023, Data length: 1176, Offset + Data length: 3199} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 4 (48 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 467410062, LowestAcked: 467410058, DelayTime: 43.842µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 467410063 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410063, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3199, Data length: 1176, Offset + Data length: 4375} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 467410064 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 467410064, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 4375, Data length: 745, Offset + Data length: 5120} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 5 (48 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 467410064, LowestAcked: 467410058, DelayTime: 49.1µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:52:59 client -> Sending packet 6 (40 bytes) for connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: d341a28bea79838d28f628d2c0f9a1ea58b5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:52:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:52:59 client Connection 831c7a487ca0c7d1e326879dc6e2216ac00c4d32 closed. 2025/09/12 03:52:59 Requesting https://server4:443/gyjppvnwhb. 2025/09/12 03:52:59 Increased receive buffer size to 14336 kiB 2025/09/12 03:52:59 Increased send buffer size to 14336 kiB 2025/09/12 03:52:59 Setting DF for IPv4 and IPv6. 2025/09/12 03:52:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:52:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:52:59 Created qlog file: /logs/qlog/311dfa76c3f92027ca6438ecade59594a05335.sqlog 2025/09/12 03:52:59 client Starting new connection to server4 ([::]:46750 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 311dfa76c3f92027ca6438ecade59594a05335, version v1 2025/09/12 03:52:59 client Installed 0-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Doing 0-RTT. 2025/09/12 03:52:59 client Restoring Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, EnableResetStreamAt: false} 2025/09/12 03:52:59 client -> Sending packet 0 (1280 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: 311dfa76c3f92027ca6438ecade59594a05335, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:52:59 client -> Sending packet 1 (1280 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: 311dfa76c3f92027ca6438ecade59594a05335, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 1229, Data length: 548, Offset + Data length: 1777} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:52:59 client <- Reading packet 155393142 (55 bytes) for connection (empty), Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 310431a9f3e10d5ef0556f0ad4d56058ff89, Token: (empty), PacketNumber: 155393142, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:52:59 client Received first packet. Switching destination connection ID to: 310431a9f3e10d5ef0556f0ad4d56058ff89 2025/09/12 03:52:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:52:59 client newly acked packets (1): [0] 2025/09/12 03:52:59 client updated RTT: 31.84081ms (σ: 15.920405ms) 2025/09/12 03:52:59 client Parsed a coalesced packet. Part 1: 155 bytes. Remaining: 1045 bytes. 2025/09/12 03:52:59 client <- Reading packet 155393143 (155 bytes) for connection (empty), Initial 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 310431a9f3e10d5ef0556f0ad4d56058ff89, Token: (empty), PacketNumber: 155393143, PacketNumberLen: 4, Length: 125, Version: v1} 2025/09/12 03:52:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 03:52:59 client newly acked packets (1): [1] 2025/09/12 03:52:59 client updated RTT: 32.153ms (σ: 12.566ms) 2025/09/12 03:52:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/09/12 03:52:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Parsed a coalesced packet. Part 2: 223 bytes. Remaining: 822 bytes. 2025/09/12 03:52:59 client <- Reading packet 155393142 (223 bytes) for connection (empty), Handshake 2025/09/12 03:52:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 310431a9f3e10d5ef0556f0ad4d56058ff89, PacketNumber: 155393142, PacketNumberLen: 4, Length: 194, Version: v1} 2025/09/12 03:52:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 03:52:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Dropping 0-RTT keys. 2025/09/12 03:52:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:52:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 311dfa76c3f92027ca6438ecade59594a05335, InitialSourceConnectionID: 310431a9f3e10d5ef0556f0ad4d56058ff89, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x768540c205c705d2b6e6dfaee641cb51, EnableResetStreamAt: false} 2025/09/12 03:52:59 client <- Reading packet 155393142 (822 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393142, PacketNumberLen: 4, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b021cf5013625ca106404599e368328f4351, StatelessResetToken: 0x364ea31b551bab5c4ec8e048e6051d8b} 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a0191872b06198be696c77a5bc91310e6a75, StatelessResetToken: 0x305cf3d9961a6a26b62fdd7174ac0d36} 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, StatelessResetToken: 0x761cb493a98aa843fdff248b9ab32f70} 2025/09/12 03:52:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:52:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335 2025/09/12 03:52:59 client Long Header{Type: Initial, DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1129, Version: v1} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393143, LowestAcked: 155393142, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Long Header{Type: Handshake, DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:52:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:52:59 client Dropping Initial keys. 2025/09/12 03:52:59 client -> Sending packet 1 (112 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, Handshake 2025/09/12 03:52:59 client Long Header{Type: Handshake, DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 29, Version: v1} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393142, LowestAcked: 155393142, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:52:59 client -> Sending packet 2 (49 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393142, LowestAcked: 155393142, DelayTime: 688.127µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 155393143 (1406 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393143, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.PingFrame{} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 155393144 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393144, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 136µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Peer doesn't await address validation any longer. 2025/09/12 03:52:59 client newly acked packets (2): [0 1] 2025/09/12 03:52:59 client Canceling loss detection timer. 2025/09/12 03:52:59 client Dropping Handshake keys. 2025/09/12 03:52:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: df9f52322f9c25231d0cbfc58d4996fea232, StatelessResetToken: 0x5a170f9e2bc48855d652a364bf57ecf8} 2025/09/12 03:52:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:52:59 client <- &wire.NewTokenFrame{Token: 0x36c040e5a0a934729e5e92790836fe04e106ea832f5dc7805ab1b6b0579554f6f6701a7e7dbcff4d30} 2025/09/12 03:52:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 847, Offset + Data length: 847} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 3 (48 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393144, LowestAcked: 155393142, DelayTime: 117.578µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 155393145 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393145, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 847, Data length: 1176, Offset + Data length: 2023} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 155393146 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393146, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2023, Data length: 1176, Offset + Data length: 3199} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 4 (48 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393146, LowestAcked: 155393142, DelayTime: 46.236µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 155393147 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393147, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3199, Data length: 1176, Offset + Data length: 4375} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 155393148 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393148, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4375, Data length: 1176, Offset + Data length: 5551} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 5 (48 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393148, LowestAcked: 155393142, DelayTime: 39.203µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 155393149 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393149, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5551, Data length: 1176, Offset + Data length: 6727} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 155393150 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393150, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 6727, Data length: 1176, Offset + Data length: 7903} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 6 (48 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393150, LowestAcked: 155393142, DelayTime: 47.297µs, ECT0: 9, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client <- Reading packet 155393151 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393151, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7903, Data length: 1176, Offset + Data length: 9079} 2025/09/12 03:52:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:52:59 client <- Reading packet 155393152 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 03:52:59 client Short Header{DestConnectionID: (empty), PacketNumber: 155393152, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:52:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 9079, Data length: 1161, Offset + Data length: 10240} 2025/09/12 03:52:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:52:59 client -> Sending packet 7 (48 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.AckFrame{LargestAcked: 155393152, LowestAcked: 155393142, DelayTime: 46.066µs, ECT0: 11, ECT1: 0, CE: 0} 2025/09/12 03:52:59 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:52:59 client -> Sending packet 8 (40 bytes) for connection 311dfa76c3f92027ca6438ecade59594a05335, 1-RTT (ECN: ECT(0)) 2025/09/12 03:52:59 client Short Header{DestConnectionID: 66ee5c8d8649019118177a64a4e7b35117ed, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:52:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:52:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:52:59 client Connection 311dfa76c3f92027ca6438ecade59594a05335 closed.