2025-09-11 21:42:33,941 Generated random file: niktvajdpm of size: 10240 2025-09-11 21:42:33,942 Requests: https://server4:443/niktvajdpm 2025-09-11 21:42:33,999 2025-09-11 21:42:33,999 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_8uprs_oc/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_ng_jzske/ DOWNLOADS=/tmp/download_4m5898pz/ SERVER_LOGS=/tmp/logs_server__3nvz8wx CLIENT_LOGS=/tmp/logs_client_s6m0pfxy SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=privateoctopus/picoquic:latest REQUESTS="https://server4:443/niktvajdpm" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-09-11 21:42:47,959 Container server Recreate Container client Recreate Container client Recreated Container server Recreated Attaching to client, server, sim sim | waiting 10s for server:443 client | Setting up routes... client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off client | Endpoint's IPv4 address is 193.167.0.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | Setting up the simulation with setup.sh server | Setting up routes... server | Actual changes: server | tx-checksum-ip-generic: off server | tx-tcp-segmentation: off [not requested] server | tx-tcp-ecn-segmentation: off [not requested] server | tx-tcp-mangleid-segmentation: off [not requested] server | tx-tcp6-segmentation: off [not requested] server | tx-udp-segmentation: off [not requested] server | tx-checksum-sctp: off server | Endpoint's IPv4 address is 193.167.100.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 server | Setup.sh completed server | Starting picoquic server for test: retry server | niktvajdpm server | Starting picoquic server ... server | TEST_PARAMS: -8 -w ./www -L -l /logs/server_log.txt -q /logs/qlog -k /certs/priv.key -c /certs/cert.pem -p 443 -V -0 -d 180000 -r server | Starting Picoquic server (v1.1.26.1) on port 443, server name = ::, just_once = 0, do_retry = 1 server | No token file present. Will create one as . server | Accept enable multipath: 0. server | Waiting for packets. client | Certificate was added to keystore sim | server:443 is available after 501.352357ms sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: waiting 30 seconds for sim:57832 client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 42:36.096 Creating connection with server4:443 with v1 client | 42:36.171 Original destination connection id: 4f0c0929373609fc (scid: 33a4c75fc62b1dcd) client | >- CryptoStream[I|ClientHello] client | 42:36.291 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 42:36.329 <- (1) Packet I|-|R|90| Retry Token (51): 7ddd81e271b774537c51016da443a87fb66fdd1d0dfd8ce9990f4cd1599cc2a4bd0f649d9c4364741a97fd5da562cad339e7a2 client | 42:36.351 -> Packet I|1|L|1200|2 Token=7ddd81e271b774537c51016da443a87fb66fdd1d0dfd8ce9990f4cd1599cc2a4bd0f649d9c4364741a97fd5da562cad339e7a2 CryptoFrame[0,257] Padding(845) client | 42:36.384 <- (2) Packet I|110170|L|179|2 Token=[] AckFrame[1|?0] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 42:36.411 -> Packet I|2|L|1201|2 Token=7ddd81e271b774537c51016da443a87fb66fdd1d0dfd8ce9990f4cd1599cc2a4bd0f649d9c4364741a97fd5da562cad339e7a2 AckFrame[110170|?0] Padding(1099) client | 42:36.384 <- (2) Packet H|0|L|761|1 CryptoFrame[0,712] client | >- CryptoStream[H|Finished] client | 42:36.441 -> Packet H|0|L|80|1 CryptoFrame[0,36] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 42:36.384 <- (2) Packet H|1|L|312|2 PingFrame[] Padding(266) client | 42:36.446 -> Packet H|1|L|46|1 AckFrame[1-0|?0] client | 42:36.385 <- (3) Packet A|0|S0|33a4c75fc62b1dcd|311|4 CryptoFrame[0,133] NewTokenFrame[f73ce99f65034a6cfa28eaabf441aee28db7679c5c3874c55a9bf92edf3d9ead40510c2634d194a670b024d20d2d0797ae3c] NewConnectionIdFrame[1,<0|3deee4bdf5a4c8aa|793065db21ffa61b89827662428a5564] Padding(68) client | 42:36.452 -> Packet A|0|S0|f2f9bc6954badff9|47|1 StreamFrame[0(CIB),0,17,fin] client | -< CryptoStream[A|NewSessionTicket] client | 42:36.473 <- (4) Packet A|2|S0|33a4c75fc62b1dcd|55|2 HandshakeDoneFrame[] Padding(28) client | 42:36.475 -> Packet A|1|S0|f2f9bc6954badff9|34|1 AckFrame[2,0|?10] client | 42:36.483 <- (5) Packet A|3|S0|33a4c75fc62b1dcd|1252|2 AckFrame[0|?0] StreamFrame[0(CIB),0,1219] client | 42:36.484 <- (6) Packet A|4|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),1219,1222] client | 42:36.487 -> Packet A|2|S0|f2f9bc6954badff9|34|1 AckFrame[4-2,0|?2] client | 42:36.491 <- (7) Packet A|5|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),2441,1222] client | 42:36.498 <- (8) Packet A|6|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),3663,1222] client | 42:36.499 -> Packet A|3|S0|f2f9bc6954badff9|34|1 AckFrame[6-2,0|?7] client | 42:36.505 <- (9) Packet A|7|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),4885,1222] client | 42:36.513 <- (10) Packet A|8|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),6107,1222] client | 42:36.514 -> Packet A|4|S0|f2f9bc6954badff9|34|1 AckFrame[8-2,0|?6] client | 42:36.520 <- (11) Packet A|9|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),7329,1222] client | 42:36.527 <- (12) Packet A|10|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),8551,1222] client | 42:36.529 -> Packet A|5|S0|f2f9bc6954badff9|34|1 AckFrame[10-2,0|?7] client | 42:36.534 <- (13) Packet A|11|S0|33a4c75fc62b1dcd|567|2 StreamFrame[0(CIB),9773,467,fin] Padding(68) client | Get requested finished in 0.37 sec (0.03 MB/s) : tech.kwik.h09.client.HttpResponseImpl@3c9d0b9d client | 42:36.539 <- (14) Packet A|12|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),6107,1222] client | 42:36.539 Receiving frame for non-existent stream 0 client | 42:36.540 -> Packet A|6|S0|f2f9bc6954badff9|34|1 AckFrame[12-2,0|?4] client | 42:36.543 Closing ClientConnection[4f0c0929373609fc/33a4c75fc62b1dcd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 42:36.545 <- (15) Packet A|13|S0|33a4c75fc62b1dcd|1252|1 StreamFrame[0(CIB),8551,1222] client | 42:36.546 <- (16) Packet A|14|S0|33a4c75fc62b1dcd|567|2 StreamFrame[0(CIB),9773,467,fin] Padding(68) client | 42:36.547 <- (17) Packet A|15|S0|33a4c75fc62b1dcd|1400|2 PingFrame[] Padding(1373) client | 42:36.546 -> Packet A|7|S0|f2f9bc6954badff9|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-2,0|?0] client | 42:36.552 -> Packet A|8|S0|f2f9bc6954badff9|41|3 ConnectionCloseFrame[0|0|] AckFrame[12-2,0|?0] ConnectionCloseFrame[0|0|] client | 42:36.555 <- (18) Packet A|16|S0|33a4c75fc62b1dcd|567|2 StreamFrame[0(CIB),9773,467,fin] Padding(67) client | 42:36.556 -> Packet A|9|S0|f2f9bc6954badff9|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-2,0|?0] client | 42:36.565 <- (19) Packet A|17|S0|33a4c75fc62b1dcd|567|2 StreamFrame[0(CIB),9773,467,fin] Padding(67) client | 42:36.577 <- (20) Packet A|18|S0|33a4c75fc62b1dcd|31|1 ConnectionCloseFrame[0|0|] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-09-11 21:42:48,040 Using the server's key log file. 2025-09-11 21:42:48,048 2025-09-11 21:42:48,049 Using the server's key log file. 2025-09-11 21:42:48,049 Using the server's key log file. 2025-09-11 21:42:48,056 2025-09-11 21:42:48,057 Using the server's key log file. 2025-09-11 21:42:48,465 Check of downloaded files succeeded. 2025-09-11 21:42:48,879 Check of Retry succeeded. Token used: 7ddd81e271b774537c51016da443a87fb66fdd1d0dfd8ce9990f4cd1599cc2a4bd0f649d9c4364741a97fd5da562cad339e7a2