2025/09/12 10:07:14 Requesting https://server4:443/paiggyhvmz. 2025/09/12 10:07:14 Increased receive buffer size to 14336 kiB 2025/09/12 10:07:14 Increased send buffer size to 14336 kiB 2025/09/12 10:07:14 Setting DF for IPv4 and IPv6. 2025/09/12 10:07:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 10:07:14 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 10:07:14 Created qlog file: /logs/qlog/fcf27b863120a4029aeb0b0b21.sqlog 2025/09/12 10:07:14 client Starting new connection to server4 ([::]:56652 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fcf27b863120a4029aeb0b0b21, version v1 2025/09/12 10:07:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 10:07:14 client -> Sending packet 0 (1280 bytes) for connection fcf27b863120a4029aeb0b0b21, Initial 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: fcf27b863120a4029aeb0b0b21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 10:07:14 client -> Sending packet 1 (1280 bytes) for connection fcf27b863120a4029aeb0b0b21, Initial 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: fcf27b863120a4029aeb0b0b21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 1235, Data length: 276, Offset + Data length: 1511} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 10:07:14 client updated RTT: 37.314988ms (σ: 18.657494ms) 2025/09/12 10:07:14 client <- Received Retry: 2025/09/12 10:07:14 client Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 8bc09785c5a3049570b90be20e08142e2ca1, Token: 0xb7b51af4d32c9dbfe7a07a7f45ec42760369902294416c9bb99212a243a7bccb9f0daf574482dc71a9cdd6a4a32035a73a341573a03b3742805a320cec4405fa27b678a298539922e777d761035a9ac2bdb7017a51f4a13528fc, Version: v1} 2025/09/12 10:07:14 client Switching destination connection ID to: 8bc09785c5a3049570b90be20e08142e2ca1 2025/09/12 10:07:14 client -> Sending packet 2 (1280 bytes) for connection fcf27b863120a4029aeb0b0b21, Initial 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: 8bc09785c5a3049570b90be20e08142e2ca1, SrcConnectionID: (empty), Token: 0xb7b51af4d32c9dbfe7a07a7f45ec42760369902294416c9bb99212a243a7bccb9f0daf574482dc71a9cdd6a4a32035a73a341573a03b3742805a320cec4405fa27b678a298539922e777d761035a9ac2bdb7017a51f4a13528fc, PacketNumber: 2, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1072, Offset + Data length: 1139} 2025/09/12 10:07:14 client -> Sending packet 3 (1280 bytes) for connection fcf27b863120a4029aeb0b0b21, Initial 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: 8bc09785c5a3049570b90be20e08142e2ca1, SrcConnectionID: (empty), Token: 0xb7b51af4d32c9dbfe7a07a7f45ec42760369902294416c9bb99212a243a7bccb9f0daf574482dc71a9cdd6a4a32035a73a341573a03b3742805a320cec4405fa27b678a298539922e777d761035a9ac2bdb7017a51f4a13528fc, PacketNumber: 3, PacketNumberLen: 2, Length: 1161, Version: v1} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 1139, Data length: 96, Offset + Data length: 1235} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 1235, Data length: 276, Offset + Data length: 1511} 2025/09/12 10:07:14 client Ignoring Retry, since a Retry was already received. 2025/09/12 10:07:14 client <- Reading packet 1937051754 (55 bytes) for connection (empty), Initial 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 831ca5591238ab7db6c583f2fedeba0bebc2, Token: (empty), PacketNumber: 1937051754, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 10:07:14 client Received first packet. Switching destination connection ID to: 831ca5591238ab7db6c583f2fedeba0bebc2 2025/09/12 10:07:14 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 10:07:14 client newly acked packets (1): [2] 2025/09/12 10:07:14 client updated RTT: 36.708ms (σ: 15.204ms) 2025/09/12 10:07:14 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/09/12 10:07:14 client <- Reading packet 1937051755 (149 bytes) for connection (empty), Initial 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 831ca5591238ab7db6c583f2fedeba0bebc2, Token: (empty), PacketNumber: 1937051755, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 10:07:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 10:07:14 client newly acked packets (1): [3] 2025/09/12 10:07:14 client updated RTT: 36.468ms (σ: 11.882ms) 2025/09/12 10:07:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 10:07:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 10:07:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 10:07:14 client Parsed a coalesced packet. Part 2: 782 bytes. Remaining: 269 bytes. 2025/09/12 10:07:14 client <- Reading packet 1937051754 (782 bytes) for connection (empty), Handshake 2025/09/12 10:07:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 831ca5591238ab7db6c583f2fedeba0bebc2, PacketNumber: 1937051754, PacketNumberLen: 4, Length: 753, Version: v1} 2025/09/12 10:07:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 10:07:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 10:07:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 10:07:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fcf27b863120a4029aeb0b0b21, InitialSourceConnectionID: 831ca5591238ab7db6c583f2fedeba0bebc2, RetrySourceConnectionID: 8bc09785c5a3049570b90be20e08142e2ca1, InitialMaxStreamDataBidiLocal: 0, InitialMaxStreamDataBidiRemote: 262144, InitialMaxStreamDataUni: 262144, InitialMaxData: 1048576, MaxBidiStreamNum: 100, MaxUniStreamNum: 0, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 7, StatelessResetToken: 0x87491d98c965c46d1a87486ce995e600, EnableResetStreamAt: false} 2025/09/12 10:07:14 client <- Reading packet 1937051754 (269 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051754, PacketNumberLen: 4, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08ce6940c4b5298f0968ec7d9f3d47db4f63, StatelessResetToken: 0x44d3f54924edbb69a74fb935cc8852e7} 2025/09/12 10:07:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99767c079ea8d78b33f0c21b1e0f15e2f8a4, StatelessResetToken: 0xf0e6ba20ba8c11279d5169df2df84afd} 2025/09/12 10:07:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, StatelessResetToken: 0x98846276fc087a3f7c06f5525c24e119} 2025/09/12 10:07:14 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 10:07:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fcf27b863120a4029aeb0b0b21 2025/09/12 10:07:14 client Long Header{Type: Initial, DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, SrcConnectionID: (empty), Token: 0xb7b51af4d32c9dbfe7a07a7f45ec42760369902294416c9bb99212a243a7bccb9f0daf574482dc71a9cdd6a4a32035a73a341573a03b3742805a320cec4405fa27b678a298539922e777d761035a9ac2bdb7017a51f4a13528fc, PacketNumber: 4, PacketNumberLen: 2, Length: 1019, Version: v1} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051755, LowestAcked: 1937051754, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client Long Header{Type: Handshake, DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 10:07:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 10:07:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 10:07:14 client Dropping Initial keys. 2025/09/12 10:07:14 client -> Sending packet 1 (60 bytes) for connection fcf27b863120a4029aeb0b0b21, Handshake 2025/09/12 10:07:14 client Long Header{Type: Handshake, DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 33, Version: v1} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051754, LowestAcked: 1937051754, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client -> Sending packet 1 (53 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051754, LowestAcked: 1937051754, DelayTime: 752.293µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client <- Reading packet 1937051755 (1406 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051755, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.PingFrame{} 2025/09/12 10:07:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 10:07:14 client <- Reading packet 1937051756 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051756, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6b95ef7ec7d90f19af51164066237279c028, StatelessResetToken: 0xdd8358f2454d4d1904c6d641fb972e04} 2025/09/12 10:07:14 client <- &wire.HandshakeDoneFrame{} 2025/09/12 10:07:14 client Dropping Handshake keys. 2025/09/12 10:07:14 client <- &wire.NewTokenFrame{Token: 0x36005d9035d197834b94d20d82898b557ec71009e6ba252003f9ba51564b459889e29dd6cb90e5f81b} 2025/09/12 10:07:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 237, Offset + Data length: 237} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 855, Offset + Data length: 855} 2025/09/12 10:07:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 10:07:14 client -> Sending packet 2 (52 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051756, LowestAcked: 1937051754, DelayTime: 84.187µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client <- Reading packet 1937051757 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051757, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 855, Data length: 1176, Offset + Data length: 2031} 2025/09/12 10:07:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 10:07:14 client <- Reading packet 1937051758 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051758, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2031, Data length: 1176, Offset + Data length: 3207} 2025/09/12 10:07:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 10:07:14 client -> Sending packet 3 (52 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051758, LowestAcked: 1937051754, DelayTime: 41.829µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client <- Reading packet 1937051759 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051759, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3207, Data length: 1176, Offset + Data length: 4383} 2025/09/12 10:07:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 10:07:14 client <- Reading packet 1937051760 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051760, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4383, Data length: 1176, Offset + Data length: 5559} 2025/09/12 10:07:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 10:07:14 client -> Sending packet 4 (52 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051760, LowestAcked: 1937051754, DelayTime: 40.235µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client <- Reading packet 1937051761 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051761, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5559, Data length: 1176, Offset + Data length: 6735} 2025/09/12 10:07:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 10:07:14 client <- Reading packet 1937051762 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051762, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 6735, Data length: 1176, Offset + Data length: 7911} 2025/09/12 10:07:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 10:07:14 client -> Sending packet 5 (52 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051762, LowestAcked: 1937051754, DelayTime: 39.805µs, ECT0: 9, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client <- Reading packet 1937051763 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051763, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7911, Data length: 1176, Offset + Data length: 9087} 2025/09/12 10:07:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 10:07:14 client <- Reading packet 1937051764 (1200 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051764, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 9087, Data length: 1153, Offset + Data length: 10240} 2025/09/12 10:07:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 10:07:14 client <- Reading packet 1937051765 (40 bytes) for connection (empty), 1-RTT 2025/09/12 10:07:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1937051765, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 10:07:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.632ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client newly acked packets (1): [0] 2025/09/12 10:07:14 client Canceling loss detection timer. 2025/09/12 10:07:14 client -> Sending packet 6 (52 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.AckFrame{LargestAcked: 1937051765, LowestAcked: 1937051754, DelayTime: 70.432µs, ECT0: 12, ECT1: 0, CE: 0} 2025/09/12 10:07:14 client Closing connection with error: Application error 0x0 (local) 2025/09/12 10:07:14 client -> Sending packet 7 (40 bytes) for connection fcf27b863120a4029aeb0b0b21, 1-RTT (ECN: ECT(0)) 2025/09/12 10:07:14 client Short Header{DestConnectionID: 0aad5331839f47ab1a15e90dfef207cb696f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 10:07:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 10:07:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 10:07:14 client Connection fcf27b863120a4029aeb0b0b21 closed.