2025/09/12 03:28:48 Requesting https://server4:443/dkkcwnovtp. 2025/09/12 03:28:48 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:48 Increased send buffer size to 14336 kiB 2025/09/12 03:28:48 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:48 Created qlog file: /logs/qlog/c63782753b63d44cfc35ece4.sqlog 2025/09/12 03:28:48 client Starting new connection to server4 ([::]:53276 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c63782753b63d44cfc35ece4, version v1 2025/09/12 03:28:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:48 client -> Sending packet 0 (1280 bytes) for connection c63782753b63d44cfc35ece4, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: c63782753b63d44cfc35ece4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:48 client -> Sending packet 1 (1280 bytes) for connection c63782753b63d44cfc35ece4, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: c63782753b63d44cfc35ece4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:28:48 client <- Reading packet 114833 (137 bytes) for connection (empty), Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c19211d5da7d74b, Token: (empty), PacketNumber: 114833, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:28:48 client Received first packet. Switching destination connection ID to: 7c19211d5da7d74b 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 504µs} 2025/09/12 03:28:48 client newly acked packets (2): [0 1] 2025/09/12 03:28:48 client updated RTT: 38.321366ms (σ: 19.160683ms) 2025/09/12 03:28:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 368 bytes. 2025/09/12 03:28:48 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7c19211d5da7d74b, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/09/12 03:28:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 03:28:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c63782753b63d44cfc35ece4, InitialSourceConnectionID: 7c19211d5da7d74b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd95d54d1bfc6205a26a68c0e1e01d72a, EnableResetStreamAt: false} 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 3: 368 bytes. Remaining: 0 bytes. 2025/09/12 03:28:48 client <- Reading packet 1 (368 bytes) for connection (empty), Handshake 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7c19211d5da7d74b, PacketNumber: 1, PacketNumberLen: 4, Length: 351, Version: v1} 2025/09/12 03:28:48 client <- &wire.PingFrame{} 2025/09/12 03:28:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c63782753b63d44cfc35ece4 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: 7c19211d5da7d74b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1142, Version: v1} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 114833, LowestAcked: 114833, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: 7c19211d5da7d74b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:48 client Short Header{DestConnectionID: 7c19211d5da7d74b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:48 client Dropping Initial keys. 2025/09/12 03:28:48 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:48 client <- &wire.NewTokenFrame{Token: 0xdd4fc5d509135273f3461b92f5fde6947a170dc514e93a902bf87b359ab3ec0e7c7d1b274882b0ec3926865cd95954deeb3e} 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: abdb74c753c8bf57, StatelessResetToken: 0x398812af156bf54bfb3744decb892aff} 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d39a0ce5f1ddf67, StatelessResetToken: 0x9880d853d74902555661346b1c7460cd} 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5144f5e0695cd500, StatelessResetToken: 0x9e926a6d70cab46ba3eec984c5023ed9} 2025/09/12 03:28:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:48 client -> Sending packet 1 (72 bytes) for connection c63782753b63d44cfc35ece4, Handshake 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: abdb74c753c8bf57, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:48 client Short Header{DestConnectionID: abdb74c753c8bf57, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:48 client -> Sending packet 2 (36 bytes) for connection c63782753b63d44cfc35ece4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:48 client Short Header{DestConnectionID: abdb74c753c8bf57, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 857.335µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:48 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200µs} 2025/09/12 03:28:48 client Peer doesn't await address validation any longer. 2025/09/12 03:28:48 client newly acked packets (1): [0] 2025/09/12 03:28:48 client updated RTT: 37.622ms (σ: 15.766ms) 2025/09/12 03:28:48 client Dropping Handshake keys. 2025/09/12 03:28:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:48 client -> Sending packet 3 (37 bytes) for connection c63782753b63d44cfc35ece4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:48 client Short Header{DestConnectionID: abdb74c753c8bf57, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 130.313µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:48 client -> Sending packet 4 (30 bytes) for connection c63782753b63d44cfc35ece4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:48 client Short Header{DestConnectionID: abdb74c753c8bf57, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:48 client Connection c63782753b63d44cfc35ece4 closed. 2025/09/12 03:28:48 Requesting https://server4:443/nwsqxngzrd. 2025/09/12 03:28:48 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:48 Increased send buffer size to 14336 kiB 2025/09/12 03:28:48 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:48 Created qlog file: /logs/qlog/a5a7628a431949fe0427f3b6030a8f87f9.sqlog 2025/09/12 03:28:48 client Starting new connection to server4 ([::]:39885 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a5a7628a431949fe0427f3b6030a8f87f9, version v1 2025/09/12 03:28:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:48 client -> Sending packet 0 (1280 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: a5a7628a431949fe0427f3b6030a8f87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:28:48 client -> Sending packet 1 (1280 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: a5a7628a431949fe0427f3b6030a8f87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 285, Offset + Data length: 1516} 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:28:48 client <- Reading packet 117477 (137 bytes) for connection (empty), Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a64e982036be3b60, Token: (empty), PacketNumber: 117477, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:28:48 client Received first packet. Switching destination connection ID to: a64e982036be3b60 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 344µs} 2025/09/12 03:28:48 client newly acked packets (2): [0 1] 2025/09/12 03:28:48 client updated RTT: 33.937345ms (σ: 16.968672ms) 2025/09/12 03:28:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 364 bytes. 2025/09/12 03:28:48 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a64e982036be3b60, PacketNumber: 0, PacketNumberLen: 4, Length: 734, Version: v1} 2025/09/12 03:28:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 03:28:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a5a7628a431949fe0427f3b6030a8f87f9, InitialSourceConnectionID: a64e982036be3b60, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xcaa03a53b4ae6d64fa4bd65ecefd3350, EnableResetStreamAt: false} 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 3: 364 bytes. Remaining: 0 bytes. 2025/09/12 03:28:48 client <- Reading packet 1 (364 bytes) for connection (empty), Handshake 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a64e982036be3b60, PacketNumber: 1, PacketNumberLen: 4, Length: 347, Version: v1} 2025/09/12 03:28:48 client <- &wire.PingFrame{} 2025/09/12 03:28:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: a64e982036be3b60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 117477, LowestAcked: 117477, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: a64e982036be3b60, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:48 client Dropping Initial keys. 2025/09/12 03:28:48 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:48 client <- &wire.NewTokenFrame{Token: 0xf04aa65c05f5e655a7d687a1f5073ffe8566230e10cf07d2dedb935745a1de056b811cb728d06d24bb57df8bba711898de69} 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 432414a4b28d644d, StatelessResetToken: 0x14d95b38e8bffc3c0b40a3e213bfd185} 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0cd4451fe347b1bb, StatelessResetToken: 0x3aeaa0ca92ac07df3eec8b26d5fc97b4} 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eacb338b71d732d9, StatelessResetToken: 0x66d65743d162fb24831c1d6fcfe6eda9} 2025/09/12 03:28:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:48 client -> Sending packet 1 (91 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9, Handshake 2025/09/12 03:28:48 client Long Header{Type: Handshake, DestConnectionID: 432414a4b28d644d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:48 client Short Header{DestConnectionID: 432414a4b28d644d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:48 client -> Sending packet 1 (36 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:48 client Short Header{DestConnectionID: 432414a4b28d644d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 636.769µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:48 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:48 client <- &wire.PingFrame{} 2025/09/12 03:28:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:48 client Sending ACK because the ACK timer expired. 2025/09/12 03:28:48 client -> Sending packet 2 (36 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:48 client Short Header{DestConnectionID: 432414a4b28d644d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.231976ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:48 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:28:48 client Peer doesn't await address validation any longer. 2025/09/12 03:28:48 client newly acked packets (1): [0] 2025/09/12 03:28:48 client Canceling loss detection timer. 2025/09/12 03:28:48 client Dropping Handshake keys. 2025/09/12 03:28:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a61c22fe7b9016a6, StatelessResetToken: 0x7b9b5c3645a0e0d3f4aa738ed0e2f7f3} 2025/09/12 03:28:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:48 client -> Sending packet 3 (30 bytes) for connection a5a7628a431949fe0427f3b6030a8f87f9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:48 client Short Header{DestConnectionID: 432414a4b28d644d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:48 client Connection a5a7628a431949fe0427f3b6030a8f87f9 closed. 2025/09/12 03:28:48 Requesting https://server4:443/ljxkeuvuje. 2025/09/12 03:28:48 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:48 Increased send buffer size to 14336 kiB 2025/09/12 03:28:48 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:48 Created qlog file: /logs/qlog/6b3a8562cb08a1280a5571be1d16a4495736c9.sqlog 2025/09/12 03:28:48 client Starting new connection to server4 ([::]:51892 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6b3a8562cb08a1280a5571be1d16a4495736c9, version v1 2025/09/12 03:28:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:48 client -> Sending packet 0 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: 6b3a8562cb08a1280a5571be1d16a4495736c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:28:48 client -> Sending packet 1 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: 6b3a8562cb08a1280a5571be1d16a4495736c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:48 client <- Reading packet 82064 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, Token: (empty), PacketNumber: 82064, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:48 client Received first packet. Switching destination connection ID to: 17eb9e5c35544688 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168µs} 2025/09/12 03:28:48 client newly acked packets (1): [0] 2025/09/12 03:28:48 client updated RTT: 31.801227ms (σ: 15.900613ms) 2025/09/12 03:28:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:48 client -> Sending packet 2 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:48 client -> Sending packet 3 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 03:28:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:48 client <- Reading packet 82066 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, Token: (empty), PacketNumber: 82066, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80µs} 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:48 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:48 client <- Reading packet 82067 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, Token: (empty), PacketNumber: 82067, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 32µs} 2025/09/12 03:28:48 client newly acked packets (1): [3] 2025/09/12 03:28:48 client updated RTT: 32.07ms (σ: 12.464ms) 2025/09/12 03:28:48 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:48 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:49 client -> Sending packet 4 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:49 client -> &wire.PingFrame{} 2025/09/12 03:28:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:49 client <- Reading packet 82068 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, Token: (empty), PacketNumber: 82068, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 48µs} 2025/09/12 03:28:49 client newly acked packets (1): [4] 2025/09/12 03:28:49 client updated RTT: 32.156ms (σ: 9.521ms) 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:49 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:49 client -> Sending packet 5 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:49 client -> &wire.PingFrame{} 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:49 client <- Reading packet 82069 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, Token: (empty), PacketNumber: 82069, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 03:28:49 client newly acked packets (1): [5] 2025/09/12 03:28:49 client updated RTT: 32.241ms (σ: 7.311ms) 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:49 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:49 client -> Sending packet 6 (1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Initial 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:49 client -> &wire.PingFrame{} 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:28:49 client <- Reading packet 82070 (183 bytes) for connection (empty), Initial 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, Token: (empty), PacketNumber: 82070, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:28:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 500.64ms} 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:28:49 client <- Reading packet 6 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 6, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:28:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 03:28:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6b3a8562cb08a1280a5571be1d16a4495736c9, InitialSourceConnectionID: 17eb9e5c35544688, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x909e35e638afa3bdf82e8e8d8322432f, EnableResetStreamAt: false} 2025/09/12 03:28:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9 2025/09/12 03:28:49 client Long Header{Type: Initial, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:49 client -> &wire.AckFrame{LargestAcked: 82070, LowestAcked: 82064, AckRanges: {{Largest: 82070, Smallest: 82066}, {Largest: 82064, Smallest: 82064}}, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:49 client Dropping Initial keys. 2025/09/12 03:28:49 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:49 client <- &wire.PingFrame{} 2025/09/12 03:28:49 client <- Reading packet 3 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 3, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:49 client <- &wire.PingFrame{} 2025/09/12 03:28:49 client <- Reading packet 4 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 4, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:49 client <- &wire.PingFrame{} 2025/09/12 03:28:49 client <- Reading packet 5 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 5, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:49 client <- &wire.PingFrame{} 2025/09/12 03:28:49 client -> Sending packet 1 (89 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:49 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:28:49 client Short Header{DestConnectionID: 17eb9e5c35544688, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:49 client Dropping %!s(logging.PacketType=0) packet (55 bytes) because we already dropped the keys. 2025/09/12 03:28:49 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:49 client <- Reading packet 7 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 7, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:49 client <- &wire.PingFrame{} 2025/09/12 03:28:49 client -> Sending packet 2 (43 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:49 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:28:49 client <- Reading packet 8 (55 bytes) for connection (empty), Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17eb9e5c35544688, PacketNumber: 8, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:28:49 client <- &wire.PingFrame{} 2025/09/12 03:28:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 72µs} 2025/09/12 03:28:49 client Peer doesn't await address validation any longer. 2025/09/12 03:28:49 client -> Sending packet 3 (43 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:49 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 03:28:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:28:49 client -> Sending packet 4 (74 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:49 client -> Sending packet 5 (74 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, Handshake 2025/09/12 03:28:49 client Long Header{Type: Handshake, DestConnectionID: 17eb9e5c35544688, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:50 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:50 client Dropping Handshake keys. 2025/09/12 03:28:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:28:50 client -> Sending packet 2 (54 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:50 client Short Header{DestConnectionID: 17eb9e5c35544688, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 106.579µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:50 client -> Sending packet 3 (46 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:50 client Short Header{DestConnectionID: 17eb9e5c35544688, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:50 client -> Sending packet 4 (30 bytes) for connection 6b3a8562cb08a1280a5571be1d16a4495736c9, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:50 client Short Header{DestConnectionID: 17eb9e5c35544688, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:50 client Connection 6b3a8562cb08a1280a5571be1d16a4495736c9 closed. 2025/09/12 03:28:50 Requesting https://server4:443/ngnshtprxo. 2025/09/12 03:28:50 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:50 Increased send buffer size to 14336 kiB 2025/09/12 03:28:50 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:50 Created qlog file: /logs/qlog/fea3ce67980f491cdf6f395806.sqlog 2025/09/12 03:28:50 client Starting new connection to server4 ([::]:33080 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fea3ce67980f491cdf6f395806, version v1 2025/09/12 03:28:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:50 client -> Sending packet 0 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: fea3ce67980f491cdf6f395806, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 03:28:50 client -> Sending packet 1 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: fea3ce67980f491cdf6f395806, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 1235, Data length: 278, Offset + Data length: 1513} 2025/09/12 03:28:50 client <- Reading packet 119910 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, Token: (empty), PacketNumber: 119910, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:50 client Received first packet. Switching destination connection ID to: da2835d66e0e0f97 2025/09/12 03:28:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200µs} 2025/09/12 03:28:50 client newly acked packets (1): [0] 2025/09/12 03:28:50 client updated RTT: 31.775241ms (σ: 15.88762ms) 2025/09/12 03:28:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:50 client -> Sending packet 2 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 1235, Data length: 278, Offset + Data length: 1513} 2025/09/12 03:28:50 client -> Sending packet 3 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:50 client -> &wire.CryptoFrame{Offset: 1235, Data length: 278, Offset + Data length: 1513} 2025/09/12 03:28:50 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:28:50 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:50 client <- Reading packet 119912 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, Token: (empty), PacketNumber: 119912, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 03:28:50 client newly acked packets (1): [3] 2025/09/12 03:28:50 client updated RTT: 32.258ms (σ: 12.882ms) 2025/09/12 03:28:50 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:50 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:50 client -> Sending packet 4 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:50 client -> &wire.PingFrame{} 2025/09/12 03:28:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:28:50 client -> Sending packet 5 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:50 client -> &wire.PingFrame{} 2025/09/12 03:28:50 client -> Sending packet 6 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:50 client Long Header{Type: Initial, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:50 client -> &wire.PingFrame{} 2025/09/12 03:28:51 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:28:51 client <- Reading packet 119915 (183 bytes) for connection (empty), Initial 2025/09/12 03:28:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, Token: (empty), PacketNumber: 119915, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:28:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:51 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 500.584ms} 2025/09/12 03:28:51 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:28:51 client <- Reading packet 5 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:28:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, PacketNumber: 5, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:28:51 client <- &wire.PingFrame{} 2025/09/12 03:28:51 client -> Sending packet 7 (1280 bytes) for connection fea3ce67980f491cdf6f395806, Initial 2025/09/12 03:28:51 client Long Header{Type: Initial, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:51 client -> &wire.AckFrame{LargestAcked: 119915, LowestAcked: 119910, AckRanges: {{Largest: 119915, Smallest: 119915}, {Largest: 119912, Smallest: 119912}, {Largest: 119910, Smallest: 119910}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:28:51 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:28:51 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:51 client <- &wire.PingFrame{} 2025/09/12 03:28:51 client -> Sending packet 0 (45 bytes) for connection fea3ce67980f491cdf6f395806, Handshake 2025/09/12 03:28:51 client Long Header{Type: Handshake, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:28:51 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:51 client Dropping Initial keys. 2025/09/12 03:28:51 client -> Sending packet 1 (37 bytes) for connection fea3ce67980f491cdf6f395806, Handshake 2025/09/12 03:28:51 client Long Header{Type: Handshake, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:28:51 client -> &wire.PingFrame{} 2025/09/12 03:28:51 client <- Reading packet 6 (55 bytes) for connection (empty), Handshake 2025/09/12 03:28:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, PacketNumber: 6, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:28:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96µs} 2025/09/12 03:28:51 client Peer doesn't await address validation any longer. 2025/09/12 03:28:51 client newly acked packets (1): [1] 2025/09/12 03:28:51 client updated RTT: 32.076ms (σ: 10.024ms) 2025/09/12 03:28:51 client Canceling loss detection timer. 2025/09/12 03:28:52 client <- Reading packet 7 (55 bytes) for connection (empty), Handshake 2025/09/12 03:28:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, PacketNumber: 7, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:28:52 client <- &wire.PingFrame{} 2025/09/12 03:28:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.001168s} 2025/09/12 03:28:52 client -> Sending packet 2 (45 bytes) for connection fea3ce67980f491cdf6f395806, Handshake 2025/09/12 03:28:52 client Long Header{Type: Handshake, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:28:52 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:28:52 client <- Reading packet 9 (55 bytes) for connection (empty), Handshake 2025/09/12 03:28:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, PacketNumber: 9, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:28:52 client <- &wire.PingFrame{} 2025/09/12 03:28:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 72µs} 2025/09/12 03:28:52 client -> Sending packet 3 (47 bytes) for connection fea3ce67980f491cdf6f395806, Handshake 2025/09/12 03:28:52 client Long Header{Type: Handshake, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:28:52 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:28:52 client <- Reading packet 11 (823 bytes) for connection (empty), Handshake 2025/09/12 03:28:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: da2835d66e0e0f97, PacketNumber: 11, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:28:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 03:28:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fea3ce67980f491cdf6f395806, InitialSourceConnectionID: da2835d66e0e0f97, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x60d8ed06935aee0da3e7581382081b85, EnableResetStreamAt: false} 2025/09/12 03:28:52 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 123.384ms} 2025/09/12 03:28:52 client -> Sending packet 4 (88 bytes) for connection fea3ce67980f491cdf6f395806, Handshake 2025/09/12 03:28:52 client Long Header{Type: Handshake, DestConnectionID: da2835d66e0e0f97, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 71, Version: v1} 2025/09/12 03:28:52 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:52 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:52 client <- &wire.PingFrame{} 2025/09/12 03:28:52 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:52 client -> Sending packet 0 (57 bytes) for connection fea3ce67980f491cdf6f395806, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:52 client Short Header{DestConnectionID: da2835d66e0e0f97, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 2.342224543s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:52 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:52 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:28:52 client newly acked packets (1): [0] 2025/09/12 03:28:52 client updated RTT: 32.042ms (σ: 7.584ms) 2025/09/12 03:28:52 client ECN capability confirmed. 2025/09/12 03:28:52 client Canceling loss detection timer. 2025/09/12 03:28:52 client Dropping Handshake keys. 2025/09/12 03:28:52 client <- &wire.NewTokenFrame{Token: 0xcf268f2aac1601727b89cf1361db47be14422104f4165440768e69e96ff7a2f442c69eef17f0a520fa92f392e85b00f5458d} 2025/09/12 03:28:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9d45ae27d86a3e7, StatelessResetToken: 0x08801ad035bc7d67c2b2aaab616fcd50} 2025/09/12 03:28:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a96d2fc4ad1ab2f1, StatelessResetToken: 0x6243aa651f6d80d45f1825f8aebbff70} 2025/09/12 03:28:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3515b80a579add5b, StatelessResetToken: 0x7a402c937c4aabf2ebb3753ee61a231b} 2025/09/12 03:28:52 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:52 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:52 client Ignoring all packets below 2. 2025/09/12 03:28:52 client -> Sending packet 1 (37 bytes) for connection fea3ce67980f491cdf6f395806, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:52 client Short Header{DestConnectionID: f9d45ae27d86a3e7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:52 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 191.388µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:52 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:52 client -> Sending packet 2 (30 bytes) for connection fea3ce67980f491cdf6f395806, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:52 client Short Header{DestConnectionID: f9d45ae27d86a3e7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:52 client Connection fea3ce67980f491cdf6f395806 closed. 2025/09/12 03:28:52 Requesting https://server4:443/zujvvftner. 2025/09/12 03:28:52 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:52 Increased send buffer size to 14336 kiB 2025/09/12 03:28:52 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:52 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:52 Created qlog file: /logs/qlog/791998f0b2c022a7f1eb.sqlog 2025/09/12 03:28:52 client Starting new connection to server4 ([::]:48293 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 791998f0b2c022a7f1eb, version v1 2025/09/12 03:28:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:52 client -> Sending packet 0 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: 791998f0b2c022a7f1eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:52 client -> Sending packet 1 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: 791998f0b2c022a7f1eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 1238, Data length: 273, Offset + Data length: 1511} 2025/09/12 03:28:52 client <- Reading packet 97519 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c1e9a1500b39be2, Token: (empty), PacketNumber: 97519, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:52 client Received first packet. Switching destination connection ID to: 1c1e9a1500b39be2 2025/09/12 03:28:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 144µs} 2025/09/12 03:28:52 client newly acked packets (1): [1] 2025/09/12 03:28:52 client updated RTT: 32.779511ms (σ: 16.389755ms) 2025/09/12 03:28:52 client setting loss timer for packet 0 (Initial) to 36.876949ms (in 2025-09-12 03:28:52.563493866 +0000 UTC m=+3.924002037) 2025/09/12 03:28:52 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:28:52.563493866 +0000 UTC m=+3.924002037 2025/09/12 03:28:52 client lost packet 0 (time threshold) 2025/09/12 03:28:52 client -> Sending packet 2 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:28:52 client Queueing packet (183 bytes) for later decryption 2025/09/12 03:28:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:52 client -> Sending packet 3 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:52 client -> Sending packet 4 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:28:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:52 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:52 client <- Reading packet 97521 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c1e9a1500b39be2, Token: (empty), PacketNumber: 97521, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:52 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 64µs} 2025/09/12 03:28:52 client newly acked packets (1): [4] 2025/09/12 03:28:52 client updated RTT: 32.917ms (σ: 12.569ms) 2025/09/12 03:28:52 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:52 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:52 client -> Sending packet 5 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:52 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:52 client -> &wire.PingFrame{} 2025/09/12 03:28:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:28:53 client -> Sending packet 6 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:53 client -> &wire.PingFrame{} 2025/09/12 03:28:53 client -> Sending packet 7 (1280 bytes) for connection 791998f0b2c022a7f1eb, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:53 client -> &wire.PingFrame{} 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:28:53 client <- Reading packet 97522 (183 bytes) for connection (empty), Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c1e9a1500b39be2, Token: (empty), PacketNumber: 97522, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:28:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 500.368ms} 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:28:53 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c1e9a1500b39be2, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:28:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/12 03:28:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 791998f0b2c022a7f1eb, InitialSourceConnectionID: 1c1e9a1500b39be2, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x037d7c96562dbdfe64bb7840d9b39fc1, EnableResetStreamAt: false} 2025/09/12 03:28:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 791998f0b2c022a7f1eb 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 97522, LowestAcked: 97519, AckRanges: {{Largest: 97522, Smallest: 97521}, {Largest: 97519, Smallest: 97519}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 1c1e9a1500b39be2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:53 client Dropping Initial keys. 2025/09/12 03:28:53 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.NewTokenFrame{Token: 0xe021d9c6b7c0d52aab29a05561348e73bb28266f54d3d36e7d5292c73274c233d3d4a1d8fb1528e67159c6d5e53750758973} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 243a1d3a1f851d5a, StatelessResetToken: 0x5b259759056b8fd6a4bc2ead98e143c0} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a52fe7b6537d744b, StatelessResetToken: 0xda1ec89f380f95d52968032224603cb6} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 581228a78bcfdd7d, StatelessResetToken: 0x9d5c48aa3e9aaf00abc4f40b2f4a1606} 2025/09/12 03:28:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:53 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c1e9a1500b39be2, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:53 client <- &wire.PingFrame{} 2025/09/12 03:28:53 client -> Sending packet 1 (91 bytes) for connection 791998f0b2c022a7f1eb, Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 243a1d3a1f851d5a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:53 client Short Header{DestConnectionID: 243a1d3a1f851d5a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:53 client -> Sending packet 1 (38 bytes) for connection 791998f0b2c022a7f1eb, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 243a1d3a1f851d5a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600.208466ms, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:53 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 16µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:28:53 client Peer doesn't await address validation any longer. 2025/09/12 03:28:53 client newly acked packets (1): [0] 2025/09/12 03:28:53 client Canceling loss detection timer. 2025/09/12 03:28:53 client Dropping Handshake keys. 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: acec38d45050579b, StatelessResetToken: 0x50cf5205038833becff3232ed2122700} 2025/09/12 03:28:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:53 client -> Sending packet 2 (37 bytes) for connection 791998f0b2c022a7f1eb, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 243a1d3a1f851d5a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 138.318µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:53 client -> Sending packet 3 (30 bytes) for connection 791998f0b2c022a7f1eb, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 243a1d3a1f851d5a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:53 client Connection 791998f0b2c022a7f1eb closed. 2025/09/12 03:28:53 Requesting https://server4:443/llidbenksj. 2025/09/12 03:28:53 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:53 Increased send buffer size to 14336 kiB 2025/09/12 03:28:53 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:53 Created qlog file: /logs/qlog/09549d3b438e2a0786a3.sqlog 2025/09/12 03:28:53 client Starting new connection to server4 ([::]:51373 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 09549d3b438e2a0786a3, version v1 2025/09/12 03:28:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:53 client -> Sending packet 0 (1280 bytes) for connection 09549d3b438e2a0786a3, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: 09549d3b438e2a0786a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:53 client -> Sending packet 1 (1280 bytes) for connection 09549d3b438e2a0786a3, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: 09549d3b438e2a0786a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 1238, Data length: 281, Offset + Data length: 1519} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:28:53 client <- Reading packet 80756 (137 bytes) for connection (empty), Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5edd15fd45d53d9b, Token: (empty), PacketNumber: 80756, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:28:53 client Received first packet. Switching destination connection ID to: 5edd15fd45d53d9b 2025/09/12 03:28:53 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 408µs} 2025/09/12 03:28:53 client newly acked packets (2): [0 1] 2025/09/12 03:28:53 client updated RTT: 34.053533ms (σ: 17.026766ms) 2025/09/12 03:28:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 371 bytes. 2025/09/12 03:28:53 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5edd15fd45d53d9b, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/09/12 03:28:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 03:28:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 09549d3b438e2a0786a3, InitialSourceConnectionID: 5edd15fd45d53d9b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb7116527fa1694fe95501d3da5782dec, EnableResetStreamAt: false} 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 3: 371 bytes. Remaining: 0 bytes. 2025/09/12 03:28:53 client <- Reading packet 1 (371 bytes) for connection (empty), Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5edd15fd45d53d9b, PacketNumber: 1, PacketNumberLen: 4, Length: 354, Version: v1} 2025/09/12 03:28:53 client <- &wire.PingFrame{} 2025/09/12 03:28:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 09549d3b438e2a0786a3 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: 5edd15fd45d53d9b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 80756, LowestAcked: 80756, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 5edd15fd45d53d9b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:53 client Dropping Initial keys. 2025/09/12 03:28:53 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.NewTokenFrame{Token: 0xb7c758ba409c00ce62abb63777fd706ca16dae2cadb608fe4edefbc4cf2688313865c7099f66c4eaf7dba3e111c2687f8245} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a8bd287889986b5, StatelessResetToken: 0x75fcdcef0cb8095f2aa402e91960314e} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cff1efc376188406, StatelessResetToken: 0xfd9e955fed0f4f403bc2d09fc3fb2d71} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8ac00e1336614cb, StatelessResetToken: 0xeb122af48576357d4f0ff671cff0e195} 2025/09/12 03:28:53 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:53 client -> Sending packet 1 (91 bytes) for connection 09549d3b438e2a0786a3, Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 0a8bd287889986b5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:53 client -> Sending packet 1 (36 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 646.774µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:28:53 client -> Sending packet 2 (74 bytes) for connection 09549d3b438e2a0786a3, Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 0a8bd287889986b5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:53 client -> Sending packet 3 (74 bytes) for connection 09549d3b438e2a0786a3, Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 0a8bd287889986b5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:53 client <- Reading packet 3 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.NewTokenFrame{Token: 0xb7c758ba409c00ce62abb63777fd706ca16dae2cadb608fe4edefbc4cf2688313865c7099f66c4eaf7dba3e111c2687f8245} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a8bd287889986b5, StatelessResetToken: 0x75fcdcef0cb8095f2aa402e91960314e} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cff1efc376188406, StatelessResetToken: 0xfd9e955fed0f4f403bc2d09fc3fb2d71} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8ac00e1336614cb, StatelessResetToken: 0xeb122af48576357d4f0ff671cff0e195} 2025/09/12 03:28:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:53 client -> Sending packet 2 (37 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 96.27µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:53 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.PingFrame{} 2025/09/12 03:28:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:53 client Sending ACK because the ACK timer expired. 2025/09/12 03:28:53 client -> Sending packet 3 (38 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.242971ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:28:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:53 client <- Reading packet 8 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.PingFrame{} 2025/09/12 03:28:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:53 client -> Sending packet 4 (39 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 72.716µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:28:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:28:53 client -> Sending packet 4 (74 bytes) for connection 09549d3b438e2a0786a3, Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 0a8bd287889986b5, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:53 client -> Sending packet 5 (74 bytes) for connection 09549d3b438e2a0786a3, Handshake 2025/09/12 03:28:53 client Long Header{Type: Handshake, DestConnectionID: 0a8bd287889986b5, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:53 client <- Reading packet 10 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.PingFrame{} 2025/09/12 03:28:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:53 client -> Sending packet 5 (41 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 66.464µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:28:53 client <- Reading packet 11 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:53 client Dropping Handshake keys. 2025/09/12 03:28:53 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 31.096ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:28:53 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:28:53 client -> Sending packet 7 (62 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 117.009µs, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:28:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:53 client -> Sending packet 8 (48 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:53 client <- Reading packet 13 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:53 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b12f7252332b0d2c, StatelessResetToken: 0x08ec400293e15ca5fb5896bba84c6eef} 2025/09/12 03:28:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:53 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:53 client -> Sending packet 9 (43 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 93.164µs, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 03:28:53 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:53 client -> Sending packet 10 (30 bytes) for connection 09549d3b438e2a0786a3, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:53 client Short Header{DestConnectionID: 0a8bd287889986b5, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:53 client Connection 09549d3b438e2a0786a3 closed. 2025/09/12 03:28:53 Requesting https://server4:443/ntyxhigack. 2025/09/12 03:28:53 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:53 Increased send buffer size to 14336 kiB 2025/09/12 03:28:53 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:53 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:53 Created qlog file: /logs/qlog/e93301ff7066f4cc46.sqlog 2025/09/12 03:28:53 client Starting new connection to server4 ([::]:48848 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e93301ff7066f4cc46, version v1 2025/09/12 03:28:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:53 client -> Sending packet 0 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: e93301ff7066f4cc46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:53 client -> Sending packet 1 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: e93301ff7066f4cc46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:28:53 client <- Reading packet 91341 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, Token: (empty), PacketNumber: 91341, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:53 client Received first packet. Switching destination connection ID to: f5515a42306d94fc 2025/09/12 03:28:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/09/12 03:28:53 client newly acked packets (1): [0] 2025/09/12 03:28:53 client updated RTT: 31.774572ms (σ: 15.887286ms) 2025/09/12 03:28:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:53 client -> Sending packet 2 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:28:53 client -> Sending packet 3 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 03:28:53 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:53 client <- Reading packet 91343 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, Token: (empty), PacketNumber: 91343, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:53 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs} 2025/09/12 03:28:53 client newly acked packets (1): [3] 2025/09/12 03:28:53 client updated RTT: 32.041ms (σ: 12.45ms) 2025/09/12 03:28:53 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:53 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:54 client -> Sending packet 4 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:54 client Long Header{Type: Initial, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:54 client -> &wire.PingFrame{} 2025/09/12 03:28:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:28:54 client -> Sending packet 5 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:54 client Long Header{Type: Initial, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:54 client -> &wire.PingFrame{} 2025/09/12 03:28:54 client -> Sending packet 6 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:54 client Long Header{Type: Initial, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:54 client -> &wire.PingFrame{} 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:28:55 client <- Reading packet 91346 (183 bytes) for connection (empty), Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, Token: (empty), PacketNumber: 91346, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:28:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 500.224ms} 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:28:55 client <- Reading packet 5 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, PacketNumber: 5, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:28:55 client <- &wire.PingFrame{} 2025/09/12 03:28:55 client -> Sending packet 7 (1280 bytes) for connection e93301ff7066f4cc46, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 91346, LowestAcked: 91341, AckRanges: {{Largest: 91346, Smallest: 91346}, {Largest: 91343, Smallest: 91343}, {Largest: 91341, Smallest: 91341}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:28:55 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:55 client <- &wire.PingFrame{} 2025/09/12 03:28:55 client -> Sending packet 0 (45 bytes) for connection e93301ff7066f4cc46, Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:55 client Dropping Initial keys. 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 823 bytes. 2025/09/12 03:28:55 client <- Reading packet 6 (55 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, PacketNumber: 6, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:28:55 client <- &wire.PingFrame{} 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/09/12 03:28:55 client Peer doesn't await address validation any longer. 2025/09/12 03:28:55 client Canceling loss detection timer. 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 2: 823 bytes. Remaining: 0 bytes. 2025/09/12 03:28:55 client <- Reading packet 7 (823 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, PacketNumber: 7, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:28:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 03:28:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e93301ff7066f4cc46, InitialSourceConnectionID: f5515a42306d94fc, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc4905457ba55babe6344e120fe4791a2, EnableResetStreamAt: false} 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/09/12 03:28:55 client <- Reading packet 8 (55 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5515a42306d94fc, PacketNumber: 8, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:28:55 client <- &wire.PingFrame{} 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/09/12 03:28:55 client -> Sending packet 1 (84 bytes) for connection e93301ff7066f4cc46, Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: f5515a42306d94fc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 67, Version: v1} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:55 client -> Sending packet 0 (46 bytes) for connection e93301ff7066f4cc46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:55 client Short Header{DestConnectionID: f5515a42306d94fc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:55 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:55 client <- &wire.NewTokenFrame{Token: 0x9893220d4b85d920ce4a8b779664d2f19ecdd5b5aba4dc2d9e8cb2c79fe0fc42d80b7ba80706edf338e631f8d41779af5252} 2025/09/12 03:28:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee6f5a599d9edf2b, StatelessResetToken: 0x6f45a2f2ec88ea7efdd33d620151c961} 2025/09/12 03:28:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df188386459d1cd4, StatelessResetToken: 0xb19f21e25a55e6dbcaa60028e72560bc} 2025/09/12 03:28:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 593844dea5180876, StatelessResetToken: 0x6fd683c3991fcfd2eecdb9287a261af3} 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:28:55 client newly acked packets (1): [0] 2025/09/12 03:28:55 client updated RTT: 31.895ms (σ: 9.628ms) 2025/09/12 03:28:55 client ECN capability confirmed. 2025/09/12 03:28:55 client Canceling loss detection timer. 2025/09/12 03:28:55 client Dropping Handshake keys. 2025/09/12 03:28:55 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:55 client -> Sending packet 1 (37 bytes) for connection e93301ff7066f4cc46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:55 client Short Header{DestConnectionID: ee6f5a599d9edf2b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 132.197µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:55 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:55 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:55 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:55 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:55 client -> Sending packet 2 (30 bytes) for connection e93301ff7066f4cc46, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:55 client Short Header{DestConnectionID: ee6f5a599d9edf2b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:55 client Connection e93301ff7066f4cc46 closed. 2025/09/12 03:28:55 Requesting https://server4:443/pdorglunwf. 2025/09/12 03:28:55 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:55 Increased send buffer size to 14336 kiB 2025/09/12 03:28:55 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:55 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:55 Created qlog file: /logs/qlog/7c1f912138ecfb072c1b3c3061ee499a598185b8.sqlog 2025/09/12 03:28:55 client Starting new connection to server4 ([::]:43108 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7c1f912138ecfb072c1b3c3061ee499a598185b8, version v1 2025/09/12 03:28:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:55 client -> Sending packet 0 (1280 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 7c1f912138ecfb072c1b3c3061ee499a598185b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:55 client -> Sending packet 1 (1280 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 7c1f912138ecfb072c1b3c3061ee499a598185b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 1228, Data length: 280, Offset + Data length: 1508} 2025/09/12 03:28:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:55 client -> Sending packet 2 (1280 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 7c1f912138ecfb072c1b3c3061ee499a598185b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:28:55 client -> Sending packet 3 (1280 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 7c1f912138ecfb072c1b3c3061ee499a598185b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 1228, Data length: 280, Offset + Data length: 1508} 2025/09/12 03:28:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1113 bytes. 2025/09/12 03:28:55 client <- Reading packet 75281 (139 bytes) for connection (empty), Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3e5959cdbfb8667, Token: (empty), PacketNumber: 75281, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/12 03:28:55 client Received first packet. Switching destination connection ID to: a3e5959cdbfb8667 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 400µs} 2025/09/12 03:28:55 client newly acked packets (1): [3] 2025/09/12 03:28:55 client updated RTT: 34.26634ms (σ: 17.13317ms) 2025/09/12 03:28:55 client setting loss timer for packet 2 (Initial) to 38.549632ms (in 2025-09-12 03:28:55.309552182 +0000 UTC m=+6.670060343) 2025/09/12 03:28:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 2: 755 bytes. Remaining: 358 bytes. 2025/09/12 03:28:55 client <- Reading packet 0 (755 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3e5959cdbfb8667, PacketNumber: 0, PacketNumberLen: 4, Length: 738, Version: v1} 2025/09/12 03:28:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 03:28:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7c1f912138ecfb072c1b3c3061ee499a598185b8, InitialSourceConnectionID: a3e5959cdbfb8667, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd94688fcc020025f858fef6f8554ddb8, EnableResetStreamAt: false} 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 3: 358 bytes. Remaining: 0 bytes. 2025/09/12 03:28:55 client <- Reading packet 1 (358 bytes) for connection (empty), Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3e5959cdbfb8667, PacketNumber: 1, PacketNumberLen: 4, Length: 341, Version: v1} 2025/09/12 03:28:55 client <- &wire.PingFrame{} 2025/09/12 03:28:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: a3e5959cdbfb8667, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 75281, LowestAcked: 75281, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: a3e5959cdbfb8667, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:55 client Dropping Initial keys. 2025/09/12 03:28:55 client -> Sending packet 1 (89 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, Handshake 2025/09/12 03:28:55 client Long Header{Type: Handshake, DestConnectionID: a3e5959cdbfb8667, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:55 client Short Header{DestConnectionID: a3e5959cdbfb8667, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:55 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104µs} 2025/09/12 03:28:55 client Peer doesn't await address validation any longer. 2025/09/12 03:28:55 client newly acked packets (1): [0] 2025/09/12 03:28:55 client updated RTT: 34.075ms (σ: 13.23ms) 2025/09/12 03:28:55 client Canceling loss detection timer. 2025/09/12 03:28:55 client Dropping Handshake keys. 2025/09/12 03:28:55 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:55 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:55 client -> Sending packet 1 (35 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:55 client Short Header{DestConnectionID: a3e5959cdbfb8667, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 109.144µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:55 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:55 client -> Sending packet 2 (30 bytes) for connection 7c1f912138ecfb072c1b3c3061ee499a598185b8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:55 client Short Header{DestConnectionID: a3e5959cdbfb8667, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:55 client Connection 7c1f912138ecfb072c1b3c3061ee499a598185b8 closed. 2025/09/12 03:28:55 Requesting https://server4:443/dpqlndqrow. 2025/09/12 03:28:55 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:55 Increased send buffer size to 14336 kiB 2025/09/12 03:28:55 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:55 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:55 Created qlog file: /logs/qlog/d424e5b8a77da20a.sqlog 2025/09/12 03:28:55 client Starting new connection to server4 ([::]:33454 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d424e5b8a77da20a, version v1 2025/09/12 03:28:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:55 client -> Sending packet 0 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: d424e5b8a77da20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:55 client -> Sending packet 1 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: d424e5b8a77da20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:55 client <- Reading packet 96670 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, Token: (empty), PacketNumber: 96670, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:55 client Received first packet. Switching destination connection ID to: 991b388e0cb910d7 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 144µs} 2025/09/12 03:28:55 client newly acked packets (1): [1] 2025/09/12 03:28:55 client updated RTT: 32.731249ms (σ: 16.365624ms) 2025/09/12 03:28:55 client setting loss timer for packet 0 (Initial) to 36.822655ms (in 2025-09-12 03:28:55.37639454 +0000 UTC m=+6.736902711) 2025/09/12 03:28:55 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:28:55.37639454 +0000 UTC m=+6.736902711 2025/09/12 03:28:55 client lost packet 0 (time threshold) 2025/09/12 03:28:55 client -> Sending packet 2 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:55 client -> Sending packet 3 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:55 client -> Sending packet 4 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:28:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:55 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:55 client <- Reading packet 96672 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, Token: (empty), PacketNumber: 96672, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:55 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 32µs} 2025/09/12 03:28:55 client newly acked packets (1): [4] 2025/09/12 03:28:55 client updated RTT: 33.076ms (σ: 12.965ms) 2025/09/12 03:28:55 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:55 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:55 client -> Sending packet 5 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:55 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:55 client -> &wire.PingFrame{} 2025/09/12 03:28:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:28:56 client -> Sending packet 6 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:56 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:56 client -> &wire.PingFrame{} 2025/09/12 03:28:56 client -> Sending packet 7 (1280 bytes) for connection d424e5b8a77da20a, Initial 2025/09/12 03:28:56 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:56 client -> &wire.PingFrame{} 2025/09/12 03:28:56 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:56 client <- Reading packet 96674 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, Token: (empty), PacketNumber: 96674, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:56 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 80µs} 2025/09/12 03:28:56 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:56 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:56 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:56 client <- Reading packet 96675 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, Token: (empty), PacketNumber: 96675, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:56 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 32µs} 2025/09/12 03:28:56 client newly acked packets (1): [7] 2025/09/12 03:28:56 client updated RTT: 33.18ms (σ: 9.933ms) 2025/09/12 03:28:56 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:56 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:56 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:28:56 client <- Reading packet 96676 (183 bytes) for connection (empty), Initial 2025/09/12 03:28:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, Token: (empty), PacketNumber: 96676, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:28:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:56 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 500.584ms} 2025/09/12 03:28:56 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:28:56 client <- Reading packet 6 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, PacketNumber: 6, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:28:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/09/12 03:28:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d424e5b8a77da20a, InitialSourceConnectionID: 991b388e0cb910d7, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x88c70a4e4a761b808b92a73c7a196651, EnableResetStreamAt: false} 2025/09/12 03:28:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d424e5b8a77da20a 2025/09/12 03:28:56 client Long Header{Type: Initial, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:56 client -> &wire.AckFrame{LargestAcked: 96676, LowestAcked: 96670, AckRanges: {{Largest: 96676, Smallest: 96674}, {Largest: 96672, Smallest: 96672}, {Largest: 96670, Smallest: 96670}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:56 client Dropping Initial keys. 2025/09/12 03:28:56 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:56 client <- &wire.PingFrame{} 2025/09/12 03:28:56 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:56 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:56 client <- &wire.PingFrame{} 2025/09/12 03:28:56 client <- Reading packet 4 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, PacketNumber: 4, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:56 client <- &wire.PingFrame{} 2025/09/12 03:28:56 client <- Reading packet 5 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 991b388e0cb910d7, PacketNumber: 5, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:56 client <- &wire.PingFrame{} 2025/09/12 03:28:56 client -> Sending packet 1 (91 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:28:56 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:28:56 client Short Header{DestConnectionID: 991b388e0cb910d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:56 client -> Sending packet 1 (38 bytes) for connection d424e5b8a77da20a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:56 client Short Header{DestConnectionID: 991b388e0cb910d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.047678669s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:28:56 client -> Sending packet 2 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:56 client -> Sending packet 3 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:28:56 client -> Sending packet 4 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:56 client -> Sending packet 5 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:56 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:28:57 client -> Sending packet 6 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:57 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:57 client -> Sending packet 7 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:57 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/09/12 03:28:57 client -> Sending packet 8 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:57 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:57 client -> Sending packet 9 (74 bytes) for connection d424e5b8a77da20a, Handshake 2025/09/12 03:28:57 client Long Header{Type: Handshake, DestConnectionID: 991b388e0cb910d7, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:58 client <- Reading packet 4 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:58 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:58 client Dropping Handshake keys. 2025/09/12 03:28:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.917376s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:28:58 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:28:58 client -> Sending packet 3 (56 bytes) for connection d424e5b8a77da20a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:58 client Short Header{DestConnectionID: 991b388e0cb910d7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:58 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 148.758µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:58 client -> Sending packet 4 (46 bytes) for connection d424e5b8a77da20a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:58 client Short Header{DestConnectionID: 991b388e0cb910d7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:58 client <- Reading packet 5 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:58 client <- &wire.PingFrame{} 2025/09/12 03:28:58 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:58 client Sending ACK because the ACK timer expired. 2025/09/12 03:28:58 client -> Sending packet 5 (38 bytes) for connection d424e5b8a77da20a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:58 client Short Header{DestConnectionID: 991b388e0cb910d7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.244012ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:28:58 client <- Reading packet 6 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:28:58 client newly acked packets (1): [4] 2025/09/12 03:28:58 client updated RTT: 33.016ms (σ: 7.777ms) 2025/09/12 03:28:58 client ECN capability confirmed. 2025/09/12 03:28:58 client Canceling loss detection timer. 2025/09/12 03:28:58 client <- &wire.NewTokenFrame{Token: 0x9d632344c1c08c6a0da21e374ae68c6771edccba4b57075a69ff3a6b498296fcab6018e4f208bf5018688afca07cd8daf73d} 2025/09/12 03:28:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70d5cadb0f7e9ffc, StatelessResetToken: 0x39215c63e91339a27de97858a07b83b3} 2025/09/12 03:28:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c41dfff7efa81c9, StatelessResetToken: 0x7addc92649d37ed8e25436d7814ae81d} 2025/09/12 03:28:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8bb2b09df9d41564, StatelessResetToken: 0x362909831b902717b5c2dbb1ad1854dd} 2025/09/12 03:28:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:58 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:58 client -> Sending packet 6 (39 bytes) for connection d424e5b8a77da20a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:58 client Short Header{DestConnectionID: 70d5cadb0f7e9ffc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 169.447µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:28:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:58 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:58 client -> Sending packet 7 (30 bytes) for connection d424e5b8a77da20a, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:58 client Short Header{DestConnectionID: 70d5cadb0f7e9ffc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:58 client Connection d424e5b8a77da20a closed. 2025/09/12 03:28:58 Requesting https://server4:443/wsahyhcdwy. 2025/09/12 03:28:58 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:58 Increased send buffer size to 14336 kiB 2025/09/12 03:28:58 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:58 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:58 Created qlog file: /logs/qlog/3a44ff0beff213410f4660cd34617d9e.sqlog 2025/09/12 03:28:58 client Starting new connection to server4 ([::]:59167 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3a44ff0beff213410f4660cd34617d9e, version v1 2025/09/12 03:28:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:58 client -> Sending packet 0 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: 3a44ff0beff213410f4660cd34617d9e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:58 client -> Sending packet 1 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: 3a44ff0beff213410f4660cd34617d9e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:28:58 client <- Reading packet 125636 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, Token: (empty), PacketNumber: 125636, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:58 client Received first packet. Switching destination connection ID to: af7ead7b4d137a33 2025/09/12 03:28:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176µs} 2025/09/12 03:28:58 client newly acked packets (1): [0] 2025/09/12 03:28:58 client updated RTT: 31.77866ms (σ: 15.88933ms) 2025/09/12 03:28:58 client Queueing packet (183 bytes) for later decryption 2025/09/12 03:28:58 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:28:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:58 client -> Sending packet 2 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:58 client -> Sending packet 3 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:58 client -> &wire.CryptoFrame{Offset: 1232, Data length: 272, Offset + Data length: 1504} 2025/09/12 03:28:58 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:58 client <- Reading packet 125638 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, Token: (empty), PacketNumber: 125638, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs} 2025/09/12 03:28:58 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:58 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:58 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:58 client <- Reading packet 125639 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, Token: (empty), PacketNumber: 125639, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:58 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 56µs} 2025/09/12 03:28:58 client newly acked packets (1): [3] 2025/09/12 03:28:58 client updated RTT: 32.03ms (σ: 12.421ms) 2025/09/12 03:28:58 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:58 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:58 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:28:58 client -> Sending packet 4 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:58 client -> &wire.PingFrame{} 2025/09/12 03:28:58 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:58 client <- Reading packet 125640 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, Token: (empty), PacketNumber: 125640, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 56µs} 2025/09/12 03:28:58 client newly acked packets (1): [4] 2025/09/12 03:28:58 client updated RTT: 32.121ms (σ: 9.498ms) 2025/09/12 03:28:58 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:58 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:59 client -> Sending packet 5 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:59 client -> &wire.PingFrame{} 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:28:59 client <- Reading packet 125641 (55 bytes) for connection (empty), Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, Token: (empty), PacketNumber: 125641, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:28:59 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 80µs} 2025/09/12 03:28:59 client newly acked packets (1): [5] 2025/09/12 03:28:59 client updated RTT: 32.215ms (σ: 7.312ms) 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:28:59 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:28:59 client -> Sending packet 6 (1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:59 client -> &wire.PingFrame{} 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:28:59 client <- Reading packet 125642 (183 bytes) for connection (empty), Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, Token: (empty), PacketNumber: 125642, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:28:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 500.632ms} 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:28:59 client <- Reading packet 6 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, PacketNumber: 6, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:28:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 03:28:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3a44ff0beff213410f4660cd34617d9e, InitialSourceConnectionID: af7ead7b4d137a33, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x329171ffbf6fd9d4a5b764eea53fd904, EnableResetStreamAt: false} 2025/09/12 03:28:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3a44ff0beff213410f4660cd34617d9e 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 125642, LowestAcked: 125636, AckRanges: {{Largest: 125642, Smallest: 125638}, {Largest: 125636, Smallest: 125636}}, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: af7ead7b4d137a33, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:59 client Dropping Initial keys. 2025/09/12 03:28:59 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:59 client <- &wire.NewTokenFrame{Token: 0xf0d0e10c3e9ef68cfb8c845b8d515a814156087d95b0242af7a3ab130b0595fd50cb8ddf38e43f65b7b1a66bb800dda4fab1} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f16a81a4c2942c27, StatelessResetToken: 0xbc46fedb98c970893a0c50e40b7a4e2d} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 96e00da7fd6d2866, StatelessResetToken: 0xef4881214a9fdd4cb7cab7c0c952cbf5} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b39706c07f13dc1e, StatelessResetToken: 0x3dd8a5b09ae9519081a3f24c95f85be8} 2025/09/12 03:28:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:59 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client <- Reading packet 3 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, PacketNumber: 3, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client <- Reading packet 4 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, PacketNumber: 4, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client <- Reading packet 5 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af7ead7b4d137a33, PacketNumber: 5, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client -> Sending packet 1 (91 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: f16a81a4c2942c27, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:28:59 client Short Header{DestConnectionID: f16a81a4c2942c27, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:59 client -> Sending packet 1 (38 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: f16a81a4c2942c27, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.10732422s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:28:59 client -> Sending packet 2 (74 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: f16a81a4c2942c27, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:59 client -> Sending packet 3 (74 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: f16a81a4c2942c27, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:59 client <- Reading packet 4 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0591f1507fa9380c, StatelessResetToken: 0x5b0d065fde83309a4136944665a49985} 2025/09/12 03:28:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:59 client Dropping Handshake keys. 2025/09/12 03:28:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:59 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:28:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:28:59 client -> Sending packet 3 (58 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: f16a81a4c2942c27, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 77.244µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:28:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:59 client -> Sending packet 4 (48 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: f16a81a4c2942c27, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:59 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:59 client -> Sending packet 5 (30 bytes) for connection 3a44ff0beff213410f4660cd34617d9e, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: f16a81a4c2942c27, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:59 client Connection 3a44ff0beff213410f4660cd34617d9e closed. 2025/09/12 03:28:59 Requesting https://server4:443/jammlatemu. 2025/09/12 03:28:59 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:59 Increased send buffer size to 14336 kiB 2025/09/12 03:28:59 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:59 Created qlog file: /logs/qlog/5769c2676a85017b3cd5cd057f8c65e54b69.sqlog 2025/09/12 03:28:59 client Starting new connection to server4 ([::]:52525 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5769c2676a85017b3cd5cd057f8c65e54b69, version v1 2025/09/12 03:28:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:59 client -> Sending packet 0 (1280 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 5769c2676a85017b3cd5cd057f8c65e54b69, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 03:28:59 client -> Sending packet 1 (1280 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 5769c2676a85017b3cd5cd057f8c65e54b69, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:59 client <- Reading packet 85060 (43 bytes) for connection (empty), Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b33344bd73ed810, Token: (empty), PacketNumber: 85060, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:28:59 client Received first packet. Switching destination connection ID to: 4b33344bd73ed810 2025/09/12 03:28:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160µs} 2025/09/12 03:28:59 client newly acked packets (1): [0] 2025/09/12 03:28:59 client updated RTT: 31.71976ms (σ: 15.85988ms) 2025/09/12 03:28:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:28:59 client -> Sending packet 2 (1280 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 4b33344bd73ed810, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:59 client -> Sending packet 3 (1280 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 4b33344bd73ed810, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 1230, Data length: 289, Offset + Data length: 1519} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1113 bytes. 2025/09/12 03:28:59 client <- Reading packet 85061 (139 bytes) for connection (empty), Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b33344bd73ed810, Token: (empty), PacketNumber: 85061, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/12 03:28:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 376µs} 2025/09/12 03:28:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:28:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 360 bytes. 2025/09/12 03:28:59 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b33344bd73ed810, PacketNumber: 0, PacketNumberLen: 4, Length: 736, Version: v1} 2025/09/12 03:28:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 03:28:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:28:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5769c2676a85017b3cd5cd057f8c65e54b69, InitialSourceConnectionID: 4b33344bd73ed810, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x01a3ce8b6ab60bfea6f46c224a67c3df, EnableResetStreamAt: false} 2025/09/12 03:28:59 client Parsed a coalesced packet. Part 3: 360 bytes. Remaining: 0 bytes. 2025/09/12 03:28:59 client <- Reading packet 1 (360 bytes) for connection (empty), Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b33344bd73ed810, PacketNumber: 1, PacketNumberLen: 4, Length: 343, Version: v1} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 4b33344bd73ed810, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 85061, LowestAcked: 85060, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: 4b33344bd73ed810, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:28:59 client Dropping Initial keys. 2025/09/12 03:28:59 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:59 client <- &wire.NewTokenFrame{Token: 0xaa743a4c650165db3f5d75eb54946728fd0cd27ba18ea6a461b2a50600213bbc9987e9a7add36f205382cdaaa17e33a92d69} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d6f7883d7f129bd, StatelessResetToken: 0x0327827b1595e6253f49f716e60477f9} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 01da71bebe0dd788, StatelessResetToken: 0xaca5fed7b140ebb2478ae3aa24a0f004} 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6402906740623a4, StatelessResetToken: 0xd290a8773de2156faa8927ce8b88c041} 2025/09/12 03:28:59 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:28:59 client -> Sending packet 1 (91 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, Handshake 2025/09/12 03:28:59 client Long Header{Type: Handshake, DestConnectionID: 3d6f7883d7f129bd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:59 client Short Header{DestConnectionID: 3d6f7883d7f129bd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:28:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:28:59 client -> Sending packet 1 (36 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: 3d6f7883d7f129bd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 525.781µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:28:59 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:59 client <- &wire.PingFrame{} 2025/09/12 03:28:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:59 client Sending ACK because the ACK timer expired. 2025/09/12 03:28:59 client -> Sending packet 2 (36 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: 3d6f7883d7f129bd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.247085ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:28:59 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:28:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:28:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:28:59 client Peer doesn't await address validation any longer. 2025/09/12 03:28:59 client newly acked packets (1): [0] 2025/09/12 03:28:59 client Canceling loss detection timer. 2025/09/12 03:28:59 client Dropping Handshake keys. 2025/09/12 03:28:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0ae8bd43b29645d6, StatelessResetToken: 0x4563605b93cc5b3c905953a3c0565bb0} 2025/09/12 03:28:59 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:28:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:28:59 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:28:59 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:28:59 client -> Sending packet 3 (30 bytes) for connection 5769c2676a85017b3cd5cd057f8c65e54b69, 1-RTT (ECN: ECT(0)) 2025/09/12 03:28:59 client Short Header{DestConnectionID: 3d6f7883d7f129bd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:28:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:28:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:28:59 client Connection 5769c2676a85017b3cd5cd057f8c65e54b69 closed. 2025/09/12 03:28:59 Requesting https://server4:443/uujztnzpur. 2025/09/12 03:28:59 Increased receive buffer size to 14336 kiB 2025/09/12 03:28:59 Increased send buffer size to 14336 kiB 2025/09/12 03:28:59 Setting DF for IPv4 and IPv6. 2025/09/12 03:28:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:28:59 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:28:59 Created qlog file: /logs/qlog/791f176f724b8581147b53894ac9387d.sqlog 2025/09/12 03:28:59 client Starting new connection to server4 ([::]:36780 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 791f176f724b8581147b53894ac9387d, version v1 2025/09/12 03:28:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:28:59 client -> Sending packet 0 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 791f176f724b8581147b53894ac9387d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:28:59 client -> Sending packet 1 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:28:59 client Long Header{Type: Initial, DestConnectionID: 791f176f724b8581147b53894ac9387d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:28:59 client -> &wire.CryptoFrame{Offset: 1232, Data length: 281, Offset + Data length: 1513} 2025/09/12 03:28:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:00 client -> Sending packet 2 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: 791f176f724b8581147b53894ac9387d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:29:00 client -> Sending packet 3 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: 791f176f724b8581147b53894ac9387d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 1232, Data length: 281, Offset + Data length: 1513} 2025/09/12 03:29:00 client <- Reading packet 123273 (45 bytes) for connection (empty), Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, Token: (empty), PacketNumber: 123273, PacketNumberLen: 4, Length: 27, Version: v1} 2025/09/12 03:29:00 client Received first packet. Switching destination connection ID to: 98c311fba746ebde 2025/09/12 03:29:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 03:29:00 client newly acked packets (1): [2] 2025/09/12 03:29:00 client updated RTT: 31.791468ms (σ: 15.895734ms) 2025/09/12 03:29:00 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:29:00 client -> Sending packet 4 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 1232, Data length: 281, Offset + Data length: 1513} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:00 client -> Sending packet 5 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:00 client -> &wire.CryptoFrame{Offset: 1232, Data length: 281, Offset + Data length: 1513} 2025/09/12 03:29:00 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:00 client <- Reading packet 123275 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, Token: (empty), PacketNumber: 123275, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:00 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 03:29:00 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:00 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:00 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:00 client <- Reading packet 123277 (183 bytes) for connection (empty), Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, Token: (empty), PacketNumber: 123277, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:29:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:00 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 250.368ms} 2025/09/12 03:29:00 client newly acked packets (1): [5] 2025/09/12 03:29:00 client updated RTT: 63.363ms (σ: 75.066ms) 2025/09/12 03:29:00 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:00 client <- Reading packet 4 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 4, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:00 client <- &wire.PingFrame{} 2025/09/12 03:29:00 client -> Sending packet 6 (1280 bytes) for connection 791f176f724b8581147b53894ac9387d, Initial 2025/09/12 03:29:00 client Long Header{Type: Initial, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:00 client -> &wire.AckFrame{LargestAcked: 123277, LowestAcked: 123273, AckRanges: {{Largest: 123277, Smallest: 123277}, {Largest: 123275, Smallest: 123275}, {Largest: 123273, Smallest: 123273}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:00 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:00 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:00 client <- &wire.PingFrame{} 2025/09/12 03:29:00 client -> Sending packet 0 (45 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:00 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:29:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:00 client Dropping Initial keys. 2025/09/12 03:29:00 client -> Sending packet 1 (37 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:00 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:29:00 client -> &wire.PingFrame{} 2025/09/12 03:29:00 client <- Reading packet 11 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 11, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 64µs} 2025/09/12 03:29:00 client Peer doesn't await address validation any longer. 2025/09/12 03:29:00 client newly acked packets (1): [1] 2025/09/12 03:29:00 client updated RTT: 59.295ms (σ: 64.435ms) 2025/09/12 03:29:00 client Canceling loss detection timer. 2025/09/12 03:29:01 client <- Reading packet 12 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 12, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:01 client <- &wire.PingFrame{} 2025/09/12 03:29:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 218.568ms} 2025/09/12 03:29:01 client -> Sending packet 2 (47 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:29:01 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:01 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 933 bytes. 2025/09/12 03:29:01 client <- Reading packet 13 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 13, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:01 client <- &wire.PingFrame{} 2025/09/12 03:29:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/09/12 03:29:01 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 878 bytes. 2025/09/12 03:29:01 client <- Reading packet 14 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 14, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:01 client <- &wire.PingFrame{} 2025/09/12 03:29:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/09/12 03:29:01 client Parsed a coalesced packet. Part 3: 55 bytes. Remaining: 823 bytes. 2025/09/12 03:29:01 client <- Reading packet 15 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 15, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:01 client <- &wire.PingFrame{} 2025/09/12 03:29:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/09/12 03:29:01 client Parsed a coalesced packet. Part 4: 823 bytes. Remaining: 0 bytes. 2025/09/12 03:29:01 client <- Reading packet 16 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 16, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 03:29:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 791f176f724b8581147b53894ac9387d, InitialSourceConnectionID: 98c311fba746ebde, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7339c7b1f875ee92c04b92aeab3b0e86, EnableResetStreamAt: false} 2025/09/12 03:29:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/09/12 03:29:01 client -> Sending packet 3 (86 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 69, Version: v1} 2025/09/12 03:29:01 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 2, AckRanges: {{Largest: 16, Smallest: 11}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 8, CE: 0} 2025/09/12 03:29:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:01 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:01 client <- &wire.PingFrame{} 2025/09/12 03:29:01 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:01 client -> Sending packet 0 (57 bytes) for connection 791f176f724b8581147b53894ac9387d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:01 client Short Header{DestConnectionID: 98c311fba746ebde, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.086675312s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:01 client <- Reading packet 17 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98c311fba746ebde, PacketNumber: 17, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:01 client <- &wire.PingFrame{} 2025/09/12 03:29:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 98.36ms} 2025/09/12 03:29:01 client -> Sending packet 4 (47 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:29:01 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 2, AckRanges: {{Largest: 17, Smallest: 11}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 9, CE: 0} 2025/09/12 03:29:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:01 client -> Sending packet 5 (74 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:01 client -> Sending packet 6 (74 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:01 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:29:02 client -> Sending packet 7 (74 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:02 client -> Sending packet 8 (74 bytes) for connection 791f176f724b8581147b53894ac9387d, Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: 98c311fba746ebde, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:02 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 952.872ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:02 client newly acked packets (1): [0] 2025/09/12 03:29:02 client updated RTT: 173.715ms (σ: 277.166ms) 2025/09/12 03:29:02 client ECN capability confirmed. 2025/09/12 03:29:02 client Canceling loss detection timer. 2025/09/12 03:29:02 client Dropping Handshake keys. 2025/09/12 03:29:02 client <- &wire.NewTokenFrame{Token: 0xba1d4fd8adf786df603923df45838d3a65de2ab0513369ee626539964dfb060312dc84702fe7e9289c155fb939517381e074} 2025/09/12 03:29:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dc65836043e434e7, StatelessResetToken: 0x8e55fce5b70649e2a3d667a0c9687e83} 2025/09/12 03:29:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8af49cd0841a988a, StatelessResetToken: 0x5e7649a184b816833596155e451dd85c} 2025/09/12 03:29:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c8718a4606932d13, StatelessResetToken: 0x31100a548c742e2327ccca9dbb9ba31b} 2025/09/12 03:29:02 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:02 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:02 client Ignoring all packets below 2. 2025/09/12 03:29:02 client -> Sending packet 1 (37 bytes) for connection 791f176f724b8581147b53894ac9387d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:02 client Short Header{DestConnectionID: dc65836043e434e7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 193.472µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:02 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:02 client -> Sending packet 2 (30 bytes) for connection 791f176f724b8581147b53894ac9387d, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:02 client Short Header{DestConnectionID: dc65836043e434e7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:02 client Connection 791f176f724b8581147b53894ac9387d closed. 2025/09/12 03:29:02 Requesting https://server4:443/rkdpdfdgym. 2025/09/12 03:29:02 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:02 Increased send buffer size to 14336 kiB 2025/09/12 03:29:02 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:02 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:02 Created qlog file: /logs/qlog/7988059c1880db36e4370c2033ad54.sqlog 2025/09/12 03:29:02 client Starting new connection to server4 ([::]:40232 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7988059c1880db36e4370c2033ad54, version v1 2025/09/12 03:29:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:02 client -> Sending packet 0 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: 7988059c1880db36e4370c2033ad54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:29:02 client -> Sending packet 1 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: 7988059c1880db36e4370c2033ad54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:02 client -> Sending packet 2 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: 7988059c1880db36e4370c2033ad54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 03:29:02 client -> Sending packet 3 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: 7988059c1880db36e4370c2033ad54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:02 client <- Reading packet 115952 (45 bytes) for connection (empty), Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, Token: (empty), PacketNumber: 115952, PacketNumberLen: 4, Length: 27, Version: v1} 2025/09/12 03:29:02 client Received first packet. Switching destination connection ID to: cc67a829036e345a 2025/09/12 03:29:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 03:29:02 client newly acked packets (1): [2] 2025/09/12 03:29:02 client updated RTT: 31.879581ms (σ: 15.93979ms) 2025/09/12 03:29:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:29:02 client -> Sending packet 4 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:02 client -> Sending packet 5 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 1233, Data length: 280, Offset + Data length: 1513} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:02 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:02 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:02 client <- Reading packet 115954 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, Token: (empty), PacketNumber: 115954, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 03:29:02 client newly acked packets (1): [5] 2025/09/12 03:29:02 client updated RTT: 32.318ms (σ: 12.833ms) 2025/09/12 03:29:02 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:02 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:02 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:02 client <- Reading packet 115955 (183 bytes) for connection (empty), Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, Token: (empty), PacketNumber: 115955, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:29:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 250.352ms} 2025/09/12 03:29:02 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:02 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:02 client <- &wire.PingFrame{} 2025/09/12 03:29:02 client -> Sending packet 6 (1280 bytes) for connection 7988059c1880db36e4370c2033ad54, Initial 2025/09/12 03:29:02 client Long Header{Type: Initial, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:02 client -> &wire.AckFrame{LargestAcked: 115955, LowestAcked: 115952, AckRanges: {{Largest: 115955, Smallest: 115954}, {Largest: 115952, Smallest: 115952}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:02 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:02 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:02 client <- &wire.PingFrame{} 2025/09/12 03:29:02 client -> Sending packet 0 (43 bytes) for connection 7988059c1880db36e4370c2033ad54, Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:02 client Dropping Initial keys. 2025/09/12 03:29:02 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/09/12 03:29:02 client <- Reading packet 4 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, PacketNumber: 4, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 03:29:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7988059c1880db36e4370c2033ad54, InitialSourceConnectionID: cc67a829036e345a, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x35bbce3f909cccf24301f980f5d15888, EnableResetStreamAt: false} 2025/09/12 03:29:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 64µs} 2025/09/12 03:29:02 client Peer doesn't await address validation any longer. 2025/09/12 03:29:02 client Canceling loss detection timer. 2025/09/12 03:29:02 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/09/12 03:29:02 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:02 client <- &wire.PingFrame{} 2025/09/12 03:29:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 64µs} 2025/09/12 03:29:02 client -> Sending packet 1 (82 bytes) for connection 7988059c1880db36e4370c2033ad54, Handshake 2025/09/12 03:29:02 client Long Header{Type: Handshake, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 03:29:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:02 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:02 client <- &wire.PingFrame{} 2025/09/12 03:29:02 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:02 client -> Sending packet 0 (57 bytes) for connection 7988059c1880db36e4370c2033ad54, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:02 client Short Header{DestConnectionID: cc67a829036e345a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 283.294511ms, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:03 client -> Sending packet 2 (74 bytes) for connection 7988059c1880db36e4370c2033ad54, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client -> Sending packet 3 (74 bytes) for connection 7988059c1880db36e4370c2033ad54, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client <- Reading packet 6 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc67a829036e345a, PacketNumber: 6, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 03:29:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96.616ms} 2025/09/12 03:29:03 client -> Sending packet 4 (43 bytes) for connection 7988059c1880db36e4370c2033ad54, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: cc67a829036e345a, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:03 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.512ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:03 client newly acked packets (1): [0] 2025/09/12 03:29:03 client updated RTT: 41.566ms (σ: 28.121ms) 2025/09/12 03:29:03 client ECN capability confirmed. 2025/09/12 03:29:03 client Canceling loss detection timer. 2025/09/12 03:29:03 client Dropping Handshake keys. 2025/09/12 03:29:03 client <- &wire.NewTokenFrame{Token: 0xc3ae46139fdfa3b7922d66f19452b903aae2915c08c327725cc4dcd6327168b351e72eb3d223c55af03e90914a33b048a190} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 49c8d1c032d2feae, StatelessResetToken: 0xcee3a75a3939cc7e894fdfb92c499eea} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4fc6d2f0c934463e, StatelessResetToken: 0x439103c0203145fbdae7fe132271eeb8} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a3dead483ae10ede, StatelessResetToken: 0x84a4628c1196dffb8ecd660751c8091d} 2025/09/12 03:29:03 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:03 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:03 client Ignoring all packets below 2. 2025/09/12 03:29:03 client -> Sending packet 1 (37 bytes) for connection 7988059c1880db36e4370c2033ad54, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:03 client Short Header{DestConnectionID: 49c8d1c032d2feae, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 201.988µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:03 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:03 client -> Sending packet 2 (30 bytes) for connection 7988059c1880db36e4370c2033ad54, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:03 client Short Header{DestConnectionID: 49c8d1c032d2feae, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:03 client Connection 7988059c1880db36e4370c2033ad54 closed. 2025/09/12 03:29:03 Requesting https://server4:443/ciukznrwau. 2025/09/12 03:29:03 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:03 Increased send buffer size to 14336 kiB 2025/09/12 03:29:03 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:03 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:03 Created qlog file: /logs/qlog/8378590f0eaaa7dd9958eea4.sqlog 2025/09/12 03:29:03 client Starting new connection to server4 ([::]:37453 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8378590f0eaaa7dd9958eea4, version v1 2025/09/12 03:29:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:03 client -> Sending packet 0 (1280 bytes) for connection 8378590f0eaaa7dd9958eea4, Initial 2025/09/12 03:29:03 client Long Header{Type: Initial, DestConnectionID: 8378590f0eaaa7dd9958eea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:29:03 client -> Sending packet 1 (1280 bytes) for connection 8378590f0eaaa7dd9958eea4, Initial 2025/09/12 03:29:03 client Long Header{Type: Initial, DestConnectionID: 8378590f0eaaa7dd9958eea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 1236, Data length: 269, Offset + Data length: 1505} 2025/09/12 03:29:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:03 client -> Sending packet 2 (1280 bytes) for connection 8378590f0eaaa7dd9958eea4, Initial 2025/09/12 03:29:03 client Long Header{Type: Initial, DestConnectionID: 8378590f0eaaa7dd9958eea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 03:29:03 client -> Sending packet 3 (1280 bytes) for connection 8378590f0eaaa7dd9958eea4, Initial 2025/09/12 03:29:03 client Long Header{Type: Initial, DestConnectionID: 8378590f0eaaa7dd9958eea4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 1236, Data length: 269, Offset + Data length: 1505} 2025/09/12 03:29:03 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:29:03 client <- Reading packet 123517 (137 bytes) for connection (empty), Initial 2025/09/12 03:29:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 92c188478c2da840, Token: (empty), PacketNumber: 123517, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:29:03 client Received first packet. Switching destination connection ID to: 92c188478c2da840 2025/09/12 03:29:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 456µs} 2025/09/12 03:29:03 client newly acked packets (1): [2] 2025/09/12 03:29:03 client updated RTT: 33.207701ms (σ: 16.60385ms) 2025/09/12 03:29:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:03 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 368 bytes. 2025/09/12 03:29:03 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 92c188478c2da840, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/09/12 03:29:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 03:29:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8378590f0eaaa7dd9958eea4, InitialSourceConnectionID: 92c188478c2da840, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3a60ec626c19fcdc67eff22d7f8ed955, EnableResetStreamAt: false} 2025/09/12 03:29:03 client Parsed a coalesced packet. Part 3: 368 bytes. Remaining: 0 bytes. 2025/09/12 03:29:03 client <- Reading packet 1 (368 bytes) for connection (empty), Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 92c188478c2da840, PacketNumber: 1, PacketNumberLen: 4, Length: 351, Version: v1} 2025/09/12 03:29:03 client <- &wire.PingFrame{} 2025/09/12 03:29:03 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:03 client <- &wire.NewTokenFrame{Token: 0xc738247ef4ded998d4379c7097ba5c579f0b8659ada11f0bcee3529e22287496c063c8b50b903a8cd1e525acd3e3f810c40c} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 095fd406a205bdca, StatelessResetToken: 0x85538f157c5984743cc059b336bc8826} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a92af162ddc21c1b, StatelessResetToken: 0xf3a606f9b59e59435267561f5321f5f4} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9be4a0bcf86c1602, StatelessResetToken: 0x32221b2de8e298bbfdf51a3f1a6559e2} 2025/09/12 03:29:03 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8378590f0eaaa7dd9958eea4 2025/09/12 03:29:03 client Long Header{Type: Initial, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 123517, LowestAcked: 123517, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:03 client Dropping Initial keys. 2025/09/12 03:29:03 client -> Sending packet 1 (43 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:03 client -> Sending packet 1 (36 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:03 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 856.452µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:03 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:03 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:03 client <- &wire.PingFrame{} 2025/09/12 03:29:03 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:03 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:03 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/09/12 03:29:03 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:03 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 92c188478c2da840, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:03 client <- &wire.PingFrame{} 2025/09/12 03:29:03 client -> Sending packet 2 (43 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:03 client Sending ACK because the ACK timer expired. 2025/09/12 03:29:03 client -> Sending packet 2 (36 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:03 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.333717ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:03 client -> Sending packet 3 (74 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client -> Sending packet 4 (74 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:03 client <- &wire.NewTokenFrame{Token: 0xc738247ef4ded998d4379c7097ba5c579f0b8659ada11f0bcee3529e22287496c063c8b50b903a8cd1e525acd3e3f810c40c} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 095fd406a205bdca, StatelessResetToken: 0x85538f157c5984743cc059b336bc8826} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a92af162ddc21c1b, StatelessResetToken: 0xf3a606f9b59e59435267561f5321f5f4} 2025/09/12 03:29:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9be4a0bcf86c1602, StatelessResetToken: 0x32221b2de8e298bbfdf51a3f1a6559e2} 2025/09/12 03:29:03 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:03 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:03 client <- &wire.PingFrame{} 2025/09/12 03:29:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:29:03 client -> Sending packet 3 (37 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:03 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 87.314µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:29:03 client -> Sending packet 5 (74 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client -> Sending packet 6 (74 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client <- Reading packet 6 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:03 client <- &wire.PingFrame{} 2025/09/12 03:29:03 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:03 client -> Sending packet 4 (39 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:03 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 105.647µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:29:03 client -> Sending packet 7 (74 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:03 client -> Sending packet 8 (74 bytes) for connection 8378590f0eaaa7dd9958eea4, Handshake 2025/09/12 03:29:03 client Long Header{Type: Handshake, DestConnectionID: 095fd406a205bdca, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:04 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:04 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:04 client Dropping Handshake keys. 2025/09/12 03:29:04 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:29:04 client -> Sending packet 6 (60 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:04 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:04 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 81.082µs, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:29:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:04 client -> Sending packet 7 (48 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:04 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:04 client <- Reading packet 8 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:04 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:29:04 client newly acked packets (1): [7] 2025/09/12 03:29:04 client updated RTT: 33.044ms (σ: 12.776ms) 2025/09/12 03:29:04 client ECN capability confirmed. 2025/09/12 03:29:04 client Canceling loss detection timer. 2025/09/12 03:29:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f0b62b6f030fa2c3, StatelessResetToken: 0xc65cf8316fd445e262c14c622f80568e} 2025/09/12 03:29:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:04 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:04 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:04 client -> Sending packet 8 (30 bytes) for connection 8378590f0eaaa7dd9958eea4, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:04 client Short Header{DestConnectionID: 095fd406a205bdca, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:04 client Connection 8378590f0eaaa7dd9958eea4 closed. 2025/09/12 03:29:04 Requesting https://server4:443/gdlidzibjd. 2025/09/12 03:29:04 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:04 Increased send buffer size to 14336 kiB 2025/09/12 03:29:04 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:04 Created qlog file: /logs/qlog/6fc45deaa51b32058298a2a291c63d0ed52eadae.sqlog 2025/09/12 03:29:04 client Starting new connection to server4 ([::]:48453 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6fc45deaa51b32058298a2a291c63d0ed52eadae, version v1 2025/09/12 03:29:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:04 client -> Sending packet 0 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 6fc45deaa51b32058298a2a291c63d0ed52eadae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:04 client -> Sending packet 1 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 6fc45deaa51b32058298a2a291c63d0ed52eadae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:04 client -> Sending packet 2 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 6fc45deaa51b32058298a2a291c63d0ed52eadae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:04 client -> Sending packet 3 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 6fc45deaa51b32058298a2a291c63d0ed52eadae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 1228, Data length: 281, Offset + Data length: 1509} 2025/09/12 03:29:04 client <- Reading packet 93566 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, Token: (empty), PacketNumber: 93566, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:04 client Received first packet. Switching destination connection ID to: 829c41f032b1e0a4 2025/09/12 03:29:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 176µs} 2025/09/12 03:29:04 client newly acked packets (1): [3] 2025/09/12 03:29:04 client updated RTT: 32.910038ms (σ: 16.455019ms) 2025/09/12 03:29:04 client setting loss timer for packet 2 (Initial) to 37.023792ms (in 2025-09-12 03:29:04.279131937 +0000 UTC m=+15.639640108) 2025/09/12 03:29:04 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 03:29:04.279131937 +0000 UTC m=+15.639640108 2025/09/12 03:29:04 client lost packet 2 (time threshold) 2025/09/12 03:29:04 client -> Sending packet 4 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:04 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:29:04 client -> Sending packet 5 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:04 client -> Sending packet 6 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:04 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:04 client <- Reading packet 93568 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, Token: (empty), PacketNumber: 93568, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:04 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 64µs} 2025/09/12 03:29:04 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:04 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:04 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:04 client <- Reading packet 93569 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, Token: (empty), PacketNumber: 93569, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:04 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 40µs} 2025/09/12 03:29:04 client newly acked packets (1): [6] 2025/09/12 03:29:04 client updated RTT: 33.027ms (σ: 12.576ms) 2025/09/12 03:29:04 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:04 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:04 client -> Sending packet 7 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:04 client -> &wire.PingFrame{} 2025/09/12 03:29:04 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:04 client <- Reading packet 93570 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, Token: (empty), PacketNumber: 93570, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:04 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 56µs} 2025/09/12 03:29:04 client newly acked packets (1): [7] 2025/09/12 03:29:04 client updated RTT: 33.01ms (σ: 9.465ms) 2025/09/12 03:29:04 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:04 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:05 client -> Sending packet 8 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:05 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:05 client -> &wire.PingFrame{} 2025/09/12 03:29:05 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:05 client <- Reading packet 93572 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, Token: (empty), PacketNumber: 93572, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:05 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, DelayTime: 56µs} 2025/09/12 03:29:05 client newly acked packets (1): [8] 2025/09/12 03:29:05 client updated RTT: 32.982ms (σ: 7.153ms) 2025/09/12 03:29:05 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:05 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:06 client -> Sending packet 9 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:06 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:06 client -> &wire.PingFrame{} 2025/09/12 03:29:06 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:06 client <- Reading packet 93573 (183 bytes) for connection (empty), Initial 2025/09/12 03:29:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, Token: (empty), PacketNumber: 93573, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:29:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:06 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, DelayTime: 1.000616s} 2025/09/12 03:29:06 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:06 client <- Reading packet 7 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 7, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:06 client <- &wire.PingFrame{} 2025/09/12 03:29:06 client -> Sending packet 10 (1280 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Initial 2025/09/12 03:29:06 client Long Header{Type: Initial, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:06 client -> &wire.AckFrame{LargestAcked: 93573, LowestAcked: 93566, AckRanges: {{Largest: 93573, Smallest: 93572}, {Largest: 93570, Smallest: 93568}, {Largest: 93566, Smallest: 93566}}, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:29:06 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:06 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:06 client <- &wire.PingFrame{} 2025/09/12 03:29:06 client <- Reading packet 3 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 3, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:06 client <- &wire.PingFrame{} 2025/09/12 03:29:06 client <- Reading packet 4 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 4, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:06 client <- &wire.PingFrame{} 2025/09/12 03:29:06 client <- Reading packet 6 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 6, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:06 client <- &wire.PingFrame{} 2025/09/12 03:29:06 client -> Sending packet 0 (45 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:29:06 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:06 client Dropping Initial keys. 2025/09/12 03:29:06 client -> Sending packet 1 (37 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:29:06 client -> &wire.PingFrame{} 2025/09/12 03:29:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:29:06 client -> Sending packet 2 (37 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:29:06 client -> &wire.PingFrame{} 2025/09/12 03:29:06 client -> Sending packet 3 (37 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 20, Version: v1} 2025/09/12 03:29:06 client -> &wire.PingFrame{} 2025/09/12 03:29:06 client <- Reading packet 10 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 10, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 03:29:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6fc45deaa51b32058298a2a291c63d0ed52eadae, InitialSourceConnectionID: 829c41f032b1e0a4, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x70914c1b268255d1b34a66e772e0e2d7, EnableResetStreamAt: false} 2025/09/12 03:29:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96.832ms} 2025/09/12 03:29:06 client Peer doesn't await address validation any longer. 2025/09/12 03:29:06 client -> Sending packet 4 (86 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 69, Version: v1} 2025/09/12 03:29:06 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:06 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:06 client <- &wire.PingFrame{} 2025/09/12 03:29:06 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:06 client -> Sending packet 0 (38 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:06 client Short Header{DestConnectionID: 829c41f032b1e0a4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 2.356620376s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:06 client -> Sending packet 1 (46 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:06 client Short Header{DestConnectionID: 829c41f032b1e0a4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:06 client <- Reading packet 12 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 829c41f032b1e0a4, PacketNumber: 12, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 03:29:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 193.728ms} 2025/09/12 03:29:06 client newly acked packets (1): [3] 2025/09/12 03:29:06 client updated RTT: 57.022ms (σ: 53.445ms) 2025/09/12 03:29:06 client -> Sending packet 5 (49 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 32, Version: v1} 2025/09/12 03:29:06 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 03:29:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:06 client -> Sending packet 6 (74 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:06 client -> Sending packet 7 (74 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, Handshake 2025/09/12 03:29:06 client Long Header{Type: Handshake, DestConnectionID: 829c41f032b1e0a4, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:06 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 271.672ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:29:06 client newly acked packets (1): [1] 2025/09/12 03:29:06 client updated RTT: 86.565ms (σ: 99.169ms) 2025/09/12 03:29:06 client ECN capability confirmed. 2025/09/12 03:29:06 client Canceling loss detection timer. 2025/09/12 03:29:06 client Dropping Handshake keys. 2025/09/12 03:29:06 client <- &wire.NewTokenFrame{Token: 0xf07669c09a1f431fc273b30871081dc4933c20f699949c85eee8a4d115574b34c1ae961ada0e4269568b1772c6b62b76b63f} 2025/09/12 03:29:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 670283f0170360ba, StatelessResetToken: 0xb8e41140898cc654b5a454916e5c82bd} 2025/09/12 03:29:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7439733a4a17ab69, StatelessResetToken: 0x484377d5afef30c6e95db82164e6397a} 2025/09/12 03:29:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 53d72cdc8dc55109, StatelessResetToken: 0x6035e51658201532e23924a2c51ae729} 2025/09/12 03:29:06 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:06 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:06 client -> Sending packet 2 (37 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:06 client Short Header{DestConnectionID: 670283f0170360ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 179.305µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:06 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:06 client -> Sending packet 3 (30 bytes) for connection 6fc45deaa51b32058298a2a291c63d0ed52eadae, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:06 client Short Header{DestConnectionID: 670283f0170360ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:06 client Connection 6fc45deaa51b32058298a2a291c63d0ed52eadae closed. 2025/09/12 03:29:06 Requesting https://server4:443/uefgoqwyst. 2025/09/12 03:29:06 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:06 Increased send buffer size to 14336 kiB 2025/09/12 03:29:06 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:06 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:06 Created qlog file: /logs/qlog/5ef6b1ecd71cccc2f81477dc62849237.sqlog 2025/09/12 03:29:06 client Starting new connection to server4 ([::]:59045 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5ef6b1ecd71cccc2f81477dc62849237, version v1 2025/09/12 03:29:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:06 client -> Sending packet 0 (1280 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Initial 2025/09/12 03:29:06 client Long Header{Type: Initial, DestConnectionID: 5ef6b1ecd71cccc2f81477dc62849237, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 03:29:06 client -> Sending packet 1 (1280 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Initial 2025/09/12 03:29:06 client Long Header{Type: Initial, DestConnectionID: 5ef6b1ecd71cccc2f81477dc62849237, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:06 client -> &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 03:29:07 client <- Reading packet 109880 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b686cf842b3b9398, Token: (empty), PacketNumber: 109880, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:07 client Received first packet. Switching destination connection ID to: b686cf842b3b9398 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 184µs} 2025/09/12 03:29:07 client newly acked packets (1): [0] 2025/09/12 03:29:07 client updated RTT: 31.72436ms (σ: 15.86218ms) 2025/09/12 03:29:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:07 client -> Sending packet 2 (1280 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: b686cf842b3b9398, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 client -> Sending packet 3 (1280 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: b686cf842b3b9398, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 1: 139 bytes. Remaining: 1113 bytes. 2025/09/12 03:29:07 client <- Reading packet 109881 (139 bytes) for connection (empty), Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b686cf842b3b9398, Token: (empty), PacketNumber: 109881, PacketNumberLen: 4, Length: 121, Version: v1} 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 464µs} 2025/09/12 03:29:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 2: 752 bytes. Remaining: 361 bytes. 2025/09/12 03:29:07 client <- Reading packet 0 (752 bytes) for connection (empty), Handshake 2025/09/12 03:29:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b686cf842b3b9398, PacketNumber: 0, PacketNumberLen: 4, Length: 735, Version: v1} 2025/09/12 03:29:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 03:29:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5ef6b1ecd71cccc2f81477dc62849237, InitialSourceConnectionID: b686cf842b3b9398, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa3be17a6309a399ea906999b09107974, EnableResetStreamAt: false} 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 3: 361 bytes. Remaining: 0 bytes. 2025/09/12 03:29:07 client <- Reading packet 1 (361 bytes) for connection (empty), Handshake 2025/09/12 03:29:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b686cf842b3b9398, PacketNumber: 1, PacketNumberLen: 4, Length: 344, Version: v1} 2025/09/12 03:29:07 client <- &wire.PingFrame{} 2025/09/12 03:29:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: b686cf842b3b9398, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:29:07 client -> &wire.AckFrame{LargestAcked: 109881, LowestAcked: 109880, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:07 client Long Header{Type: Handshake, DestConnectionID: b686cf842b3b9398, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:07 client Dropping Initial keys. 2025/09/12 03:29:07 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:07 client <- &wire.NewTokenFrame{Token: 0xd59ab21de1acb5e80d549fd3e174ed8a11e7227dc32c86ebba15666e2075d30f617073ee46a494e89f5f968c5bf070e21c07} 2025/09/12 03:29:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 982f26a71add1c0f, StatelessResetToken: 0x8f0fd82669e74ff89cab29966d15c109} 2025/09/12 03:29:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 817e606802d1139f, StatelessResetToken: 0x5aa527aa7cbfaf392b538428161dfe43} 2025/09/12 03:29:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c7862b52d44a117c, StatelessResetToken: 0x0f5ba1535c1cd0e6a2bd005ecbdf8ce3} 2025/09/12 03:29:07 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:07 client -> Sending packet 1 (91 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Handshake 2025/09/12 03:29:07 client Long Header{Type: Handshake, DestConnectionID: 982f26a71add1c0f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:07 client Short Header{DestConnectionID: 982f26a71add1c0f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:07 client -> Sending packet 1 (36 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:07 client Short Header{DestConnectionID: 982f26a71add1c0f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 638.072µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:07 client -> Sending packet 2 (74 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Handshake 2025/09/12 03:29:07 client Long Header{Type: Handshake, DestConnectionID: 982f26a71add1c0f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:07 client -> Sending packet 3 (74 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, Handshake 2025/09/12 03:29:07 client Long Header{Type: Handshake, DestConnectionID: 982f26a71add1c0f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:07 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:07 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:07 client Dropping Handshake keys. 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 97.2ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:29:07 client -> Sending packet 3 (58 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:07 client Short Header{DestConnectionID: 982f26a71add1c0f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 86.472µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:07 client -> Sending packet 4 (48 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:07 client Short Header{DestConnectionID: 982f26a71add1c0f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:07 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 03:29:07 client newly acked packets (1): [4] 2025/09/12 03:29:07 client updated RTT: 31.733ms (σ: 11.915ms) 2025/09/12 03:29:07 client ECN capability confirmed. 2025/09/12 03:29:07 client Canceling loss detection timer. 2025/09/12 03:29:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2cd4210b81fd89b9, StatelessResetToken: 0x60b4cca5c8d9c2627ef340b01f6b17c2} 2025/09/12 03:29:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:07 client -> Sending packet 5 (39 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:07 client Short Header{DestConnectionID: 982f26a71add1c0f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:07 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 138.66µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:07 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:07 client -> Sending packet 6 (30 bytes) for connection 5ef6b1ecd71cccc2f81477dc62849237, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:07 client Short Header{DestConnectionID: 982f26a71add1c0f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:07 client Connection 5ef6b1ecd71cccc2f81477dc62849237 closed. 2025/09/12 03:29:07 Requesting https://server4:443/csqedrvtkh. 2025/09/12 03:29:07 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:07 Increased send buffer size to 14336 kiB 2025/09/12 03:29:07 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:07 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:07 Created qlog file: /logs/qlog/d02091339c72a7f377380d9bde6aeeb9eeb3c874.sqlog 2025/09/12 03:29:07 client Starting new connection to server4 ([::]:48689 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d02091339c72a7f377380d9bde6aeeb9eeb3c874, version v1 2025/09/12 03:29:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:07 client -> Sending packet 0 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: d02091339c72a7f377380d9bde6aeeb9eeb3c874, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:07 client -> Sending packet 1 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: d02091339c72a7f377380d9bde6aeeb9eeb3c874, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 client <- Reading packet 105438 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, Token: (empty), PacketNumber: 105438, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:07 client Received first packet. Switching destination connection ID to: db9d7147608120bc 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176µs} 2025/09/12 03:29:07 client newly acked packets (1): [0] 2025/09/12 03:29:07 client updated RTT: 31.785844ms (σ: 15.892922ms) 2025/09/12 03:29:07 client Queueing packet (183 bytes) for later decryption 2025/09/12 03:29:07 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:07 client -> Sending packet 2 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 client -> Sending packet 3 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:29:07 client -> Sending packet 4 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 03:29:07 client -> Sending packet 5 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 277, Offset + Data length: 1505} 2025/09/12 03:29:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:07 client <- Reading packet 105441 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, Token: (empty), PacketNumber: 105441, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:07 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:07 client <- Reading packet 105442 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, Token: (empty), PacketNumber: 105442, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:07 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 48µs} 2025/09/12 03:29:07 client newly acked packets (1): [5] 2025/09/12 03:29:07 client updated RTT: 32.045ms (σ: 12.44ms) 2025/09/12 03:29:07 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:07 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:07 client -> Sending packet 6 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:07 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:07 client -> &wire.PingFrame{} 2025/09/12 03:29:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 03:29:08 client -> Sending packet 7 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:08 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:08 client -> &wire.PingFrame{} 2025/09/12 03:29:08 client -> Sending packet 8 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:08 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:08 client -> &wire.PingFrame{} 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:08 client <- Reading packet 105444 (183 bytes) for connection (empty), Initial 2025/09/12 03:29:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, Token: (empty), PacketNumber: 105444, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:29:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:08 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 1.000752s} 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:08 client <- Reading packet 6 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 6, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client -> Sending packet 9 (1280 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Initial 2025/09/12 03:29:08 client Long Header{Type: Initial, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 105444, LowestAcked: 105438, AckRanges: {{Largest: 105444, Smallest: 105444}, {Largest: 105442, Smallest: 105441}, {Largest: 105438, Smallest: 105438}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:08 client Queueing packet (183 bytes) for later decryption 2025/09/12 03:29:08 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:08 client <- Reading packet 3 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 3, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client <- Reading packet 4 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 4, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client -> Sending packet 0 (45 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:08 client Dropping Initial keys. 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:08 client Dropping %!s(logging.PacketType=0) packet (55 bytes) because we already dropped the keys. 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:08 client <- Reading packet 8 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 8, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client -> Sending packet 1 (47 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 878 bytes. 2025/09/12 03:29:08 client <- Reading packet 9 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 9, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 32µs} 2025/09/12 03:29:08 client Peer doesn't await address validation any longer. 2025/09/12 03:29:08 client Canceling loss detection timer. 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 823 bytes. 2025/09/12 03:29:08 client <- Reading packet 10 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 10, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 32µs} 2025/09/12 03:29:08 client Parsed a coalesced packet. Part 3: 823 bytes. Remaining: 0 bytes. 2025/09/12 03:29:08 client <- Reading packet 11 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 11, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 03:29:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d02091339c72a7f377380d9bde6aeeb9eeb3c874, InitialSourceConnectionID: db9d7147608120bc, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xbf613fea8ac3d63e3513d9f3d2329ae0, EnableResetStreamAt: false} 2025/09/12 03:29:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 32µs} 2025/09/12 03:29:08 client -> Sending packet 2 (86 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: db9d7147608120bc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 69, Version: v1} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 0s, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 03:29:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:08 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:08 client <- &wire.NewTokenFrame{Token: 0xf21353d24027351698813ea5012bfbd702e5d8b3ba7c0875cca1e18d5c69a1f85a37eb9664e559d0ed27d7a13e668e7654bf} 2025/09/12 03:29:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e58289fefb52644f, StatelessResetToken: 0xed70bf7d9f36a9a59e5c9a2db261b5a1} 2025/09/12 03:29:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 78716f26065f759e, StatelessResetToken: 0xb46214ec70c7aedeeeba5deff992940f} 2025/09/12 03:29:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 04863c2eccf1a8e2, StatelessResetToken: 0x58a3b5337a1c0ae255e8845bac251712} 2025/09/12 03:29:08 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:08 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:08 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client -> Sending packet 0 (59 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:08 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.319688632s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:08 client <- Reading packet 12 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: db9d7147608120bc, PacketNumber: 12, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:08 client <- &wire.PingFrame{} 2025/09/12 03:29:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 30.088ms} 2025/09/12 03:29:08 client -> Sending packet 3 (47 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 0s, ECT0: 0, ECT1: 8, CE: 0} 2025/09/12 03:29:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:08 client -> Sending packet 4 (74 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:08 client -> Sending packet 5 (74 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 03:29:08 client -> Sending packet 6 (74 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:08 client -> Sending packet 7 (74 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:08 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:08 client <- Reading packet 5 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:08 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:08 client <- &wire.NewTokenFrame{Token: 0xf21353d24027351698813ea5012bfbd702e5d8b3ba7c0875cca1e18d5c69a1f85a37eb9664e559d0ed27d7a13e668e7654bf} 2025/09/12 03:29:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e58289fefb52644f, StatelessResetToken: 0xed70bf7d9f36a9a59e5c9a2db261b5a1} 2025/09/12 03:29:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 78716f26065f759e, StatelessResetToken: 0xb46214ec70c7aedeeeba5deff992940f} 2025/09/12 03:29:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 04863c2eccf1a8e2, StatelessResetToken: 0x58a3b5337a1c0ae255e8845bac251712} 2025/09/12 03:29:08 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:08 client -> Sending packet 1 (37 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:08 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:08 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 111.338µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 03:29:09 client -> Sending packet 8 (74 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:09 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:09 client -> Sending packet 9 (74 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, Handshake 2025/09/12 03:29:09 client Long Header{Type: Handshake, DestConnectionID: e58289fefb52644f, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:09 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:09 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:09 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:09 client Dropping Handshake keys. 2025/09/12 03:29:09 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:29:09 client -> Sending packet 3 (60 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:09 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:09 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 96.681µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:09 client -> Sending packet 4 (48 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:09 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:09 client <- Reading packet 8 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:09 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 128µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:09 client newly acked packets (1): [4] 2025/09/12 03:29:09 client updated RTT: 31.904ms (σ: 9.61ms) 2025/09/12 03:29:09 client ECN capability confirmed. 2025/09/12 03:29:09 client Canceling loss detection timer. 2025/09/12 03:29:09 client <- Reading packet 9 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:09 client <- &wire.NewTokenFrame{Token: 0xf21353d24027351698813ea5012bfbd702e5d8b3ba7c0875cca1e18d5c69a1f85a37eb9664e559d0ed27d7a13e668e7654bf} 2025/09/12 03:29:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e58289fefb52644f, StatelessResetToken: 0xed70bf7d9f36a9a59e5c9a2db261b5a1} 2025/09/12 03:29:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 78716f26065f759e, StatelessResetToken: 0xb46214ec70c7aedeeeba5deff992940f} 2025/09/12 03:29:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 04863c2eccf1a8e2, StatelessResetToken: 0x58a3b5337a1c0ae255e8845bac251712} 2025/09/12 03:29:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 407.808ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:09 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:09 client -> Sending packet 5 (1360 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:09 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:09 client -> &wire.PingFrame{} 2025/09/12 03:29:09 client <- Reading packet 10 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:09 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1933e4f11b17414c, StatelessResetToken: 0x9d5262c807fd0e2d224bdc44aac2c8eb} 2025/09/12 03:29:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:29:09 client -> Sending packet 6 (39 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:09 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:09 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 97.923µs, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 03:29:09 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:09 client -> Sending packet 7 (30 bytes) for connection d02091339c72a7f377380d9bde6aeeb9eeb3c874, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:09 client Short Header{DestConnectionID: e58289fefb52644f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:09 client Connection d02091339c72a7f377380d9bde6aeeb9eeb3c874 closed. 2025/09/12 03:29:09 Requesting https://server4:443/irzlvuigvi. 2025/09/12 03:29:09 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:09 Increased send buffer size to 14336 kiB 2025/09/12 03:29:09 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:09 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:09 Created qlog file: /logs/qlog/b62606f23bc9601ae8.sqlog 2025/09/12 03:29:09 client Starting new connection to server4 ([::]:34468 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b62606f23bc9601ae8, version v1 2025/09/12 03:29:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:09 client -> Sending packet 0 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: b62606f23bc9601ae8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 03:29:09 client -> Sending packet 1 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: b62606f23bc9601ae8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:09 client <- Reading packet 92140 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, Token: (empty), PacketNumber: 92140, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:09 client Received first packet. Switching destination connection ID to: 7a5db4ad485b411a 2025/09/12 03:29:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/09/12 03:29:09 client newly acked packets (1): [0] 2025/09/12 03:29:09 client updated RTT: 31.799295ms (σ: 15.899647ms) 2025/09/12 03:29:09 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:09 client -> Sending packet 2 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:09 client -> Sending packet 3 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:09 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:09 client <- Reading packet 92142 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, Token: (empty), PacketNumber: 92142, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:09 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 64µs} 2025/09/12 03:29:09 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:09 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 03:29:09 client -> Sending packet 4 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:09 client -> Sending packet 5 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:09 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 03:29:10 client -> Sending packet 6 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:10 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:10 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:10 client -> Sending packet 7 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:10 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:10 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:10 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:10 client <- Reading packet 92145 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, Token: (empty), PacketNumber: 92145, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:10 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 03:29:10 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:10 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 03:29:11 client -> Sending packet 8 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:11 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:11 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:11 client -> Sending packet 9 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:11 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:11 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 03:29:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:11 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:11 client <- Reading packet 92147 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, Token: (empty), PacketNumber: 92147, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:11 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 88µs} 2025/09/12 03:29:11 client newly acked packets (1): [9] 2025/09/12 03:29:11 client updated RTT: 32.065ms (σ: 12.457ms) 2025/09/12 03:29:11 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:11 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:12 client <- Reading packet 92148 (183 bytes) for connection (empty), Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, Token: (empty), PacketNumber: 92148, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:29:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}}, DelayTime: 1.000288s} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:12 client <- Reading packet 8 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 8, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client -> Sending packet 10 (1280 bytes) for connection b62606f23bc9601ae8, Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 92148, LowestAcked: 92140, AckRanges: {{Largest: 92148, Smallest: 92147}, {Largest: 92145, Smallest: 92145}, {Largest: 92142, Smallest: 92142}, {Largest: 92140, Smallest: 92140}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:12 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:12 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client <- Reading packet 5 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 5, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client <- Reading packet 7 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 7, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client -> Sending packet 0 (47 bytes) for connection b62606f23bc9601ae8, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:12 client Dropping Initial keys. 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 988 bytes. 2025/09/12 03:29:12 client <- Reading packet 9 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 9, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 933 bytes. 2025/09/12 03:29:12 client <- Reading packet 10 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 10, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 3: 55 bytes. Remaining: 878 bytes. 2025/09/12 03:29:12 client <- Reading packet 11 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 11, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 4: 55 bytes. Remaining: 823 bytes. 2025/09/12 03:29:12 client <- Reading packet 12 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 12, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 5: 823 bytes. Remaining: 0 bytes. 2025/09/12 03:29:12 client <- Reading packet 13 (823 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 13, PacketNumberLen: 4, Length: 806, Version: v1} 2025/09/12 03:29:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/09/12 03:29:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b62606f23bc9601ae8, InitialSourceConnectionID: 7a5db4ad485b411a, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x0dee29a6412d0dd304639e9d10101d99, EnableResetStreamAt: false} 2025/09/12 03:29:12 client -> Sending packet 1 (86 bytes) for connection b62606f23bc9601ae8, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 69, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 2, AckRanges: {{Largest: 13, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 9, CE: 0} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:12 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:12 client <- Reading packet 14 (55 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a5db4ad485b411a, PacketNumber: 14, PacketNumberLen: 4, Length: 38, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client -> Sending packet 2 (93 bytes) for connection b62606f23bc9601ae8, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 7a5db4ad485b411a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 2, AckRanges: {{Largest: 14, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 10, CE: 0} 2025/09/12 03:29:12 client Short Header{DestConnectionID: 7a5db4ad485b411a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client -> Sending packet 1 (38 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 7a5db4ad485b411a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 2.465888035s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:12 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.NewTokenFrame{Token: 0xf90a0be2c5ff66b7b6f2b888a8891d8f126ca864989a9a59d15c01579db74581726c82a678ab933de562d571762cd65f8043} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 662106cecbdf73d3, StatelessResetToken: 0x24d9311b1d50413af88f7aa1f2240abd} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a12445763f05a757, StatelessResetToken: 0xd00e06307dea3ea42308eef2b87c79f8} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: af8f5d336163502a, StatelessResetToken: 0x5c2332644379a278493cd3c8b8c8acc8} 2025/09/12 03:29:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:12 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:12 client Dropping Handshake keys. 2025/09/12 03:29:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:29:12 client -> Sending packet 2 (37 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 146.844µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:12 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:12 client Sending ACK because the ACK timer expired. 2025/09/12 03:29:12 client -> Sending packet 3 (36 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 25.222753ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:12 client <- Reading packet 5 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:12 client newly acked packets (1): [2] 2025/09/12 03:29:12 client updated RTT: 31.894ms (σ: 9.684ms) 2025/09/12 03:29:12 client ECN capability confirmed. 2025/09/12 03:29:12 client lost packet 0 (time threshold) 2025/09/12 03:29:12 client Canceling loss detection timer. 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 63511451b6ace6d1, StatelessResetToken: 0xaaab616a80b2af23897de1d1c42d03f9} 2025/09/12 03:29:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:12 client Ignoring all packets below 4. 2025/09/12 03:29:12 client -> Sending packet 4 (54 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 126.286µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:29:12 client -> Sending packet 6 (46 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client -> Sending packet 7 (46 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client <- Reading packet 8 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 40µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 03:29:12 client newly acked packets (1): [7] 2025/09/12 03:29:12 client updated RTT: 31.746ms (σ: 7.557ms) 2025/09/12 03:29:12 client Canceling loss detection timer. 2025/09/12 03:29:12 client <- Reading packet 9 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 63511451b6ace6d1, StatelessResetToken: 0xaaab616a80b2af23897de1d1c42d03f9} 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 188ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 03:29:12 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:12 client -> Sending packet 8 (1360 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.PingFrame{} 2025/09/12 03:29:12 client -> Sending packet 9 (37 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 4}}, DelayTime: 185.687µs, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 03:29:12 client <- Reading packet 10 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 48µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 03:29:12 client newly acked packets (1): [8] 2025/09/12 03:29:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:12 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:12 client -> Sending packet 10 (30 bytes) for connection b62606f23bc9601ae8, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 662106cecbdf73d3, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:12 client Connection b62606f23bc9601ae8 closed. 2025/09/12 03:29:12 Requesting https://server4:443/ntyqymejjp. 2025/09/12 03:29:12 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:12 Increased send buffer size to 14336 kiB 2025/09/12 03:29:12 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:12 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:12 Created qlog file: /logs/qlog/acba3e6c6d4c44a4fd30.sqlog 2025/09/12 03:29:12 client Starting new connection to server4 ([::]:59286 -> 193.167.100.100:443), source connection ID (empty), destination connection ID acba3e6c6d4c44a4fd30, version v1 2025/09/12 03:29:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:12 client -> Sending packet 0 (1280 bytes) for connection acba3e6c6d4c44a4fd30, Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: acba3e6c6d4c44a4fd30, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:12 client -> Sending packet 1 (1280 bytes) for connection acba3e6c6d4c44a4fd30, Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: acba3e6c6d4c44a4fd30, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 1238, Data length: 273, Offset + Data length: 1511} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:12 client <- Reading packet 100699 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 77b1347523b5752d, Token: (empty), PacketNumber: 100699, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:12 client Received first packet. Switching destination connection ID to: 77b1347523b5752d 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/09/12 03:29:12 client newly acked packets (1): [0] 2025/09/12 03:29:12 client updated RTT: 31.825459ms (σ: 15.912729ms) 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:29:12 client <- Reading packet 100700 (137 bytes) for connection (empty), Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 77b1347523b5752d, Token: (empty), PacketNumber: 100700, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 400µs} 2025/09/12 03:29:12 client newly acked packets (1): [1] 2025/09/12 03:29:12 client updated RTT: 32.097ms (σ: 12.479ms) 2025/09/12 03:29:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 370 bytes. 2025/09/12 03:29:12 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 77b1347523b5752d, PacketNumber: 0, PacketNumberLen: 4, Length: 728, Version: v1} 2025/09/12 03:29:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/12 03:29:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: acba3e6c6d4c44a4fd30, InitialSourceConnectionID: 77b1347523b5752d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9f652fc0432bccd156005e246f739c4b, EnableResetStreamAt: false} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 3: 370 bytes. Remaining: 0 bytes. 2025/09/12 03:29:12 client <- Reading packet 1 (370 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 77b1347523b5752d, PacketNumber: 1, PacketNumberLen: 4, Length: 353, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection acba3e6c6d4c44a4fd30 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: 77b1347523b5752d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 100700, LowestAcked: 100699, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 77b1347523b5752d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:12 client Dropping Initial keys. 2025/09/12 03:29:12 client -> Sending packet 1 (43 bytes) for connection acba3e6c6d4c44a4fd30, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 77b1347523b5752d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:12 client -> Sending packet 0 (46 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 77b1347523b5752d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:12 client -> Sending packet 2 (74 bytes) for connection acba3e6c6d4c44a4fd30, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 77b1347523b5752d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:12 client -> Sending packet 3 (74 bytes) for connection acba3e6c6d4c44a4fd30, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: 77b1347523b5752d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:12 client <- Reading packet 3 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.NewTokenFrame{Token: 0xb207dac4083bfda32fc0ebd39fe741b56ec9f2939ea6c427139640b1df8e5758482960736dbb3f3a27341a5dc342a47949f2} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 66342f5b78fc2877, StatelessResetToken: 0xc3d9004d48b8175b8ed65e4cd6bd791a} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9752d673bcb9b32e, StatelessResetToken: 0x5103fcaf00518d71d9c3dbb5f1976096} 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4277c9ad5a4cb938, StatelessResetToken: 0x2125b91e7068046efeffe39a9dcbf393} 2025/09/12 03:29:12 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:12 client -> Sending packet 1 (37 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 116.157µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:12 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:12 client Sending ACK because the ACK timer expired. 2025/09/12 03:29:12 client -> Sending packet 2 (36 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.413312ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:12 client <- Reading packet 5 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:12 client Dropping Handshake keys. 2025/09/12 03:29:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ab9b1431c82934f3, StatelessResetToken: 0x2928cce9595390c017e9f40f3942a2db} 2025/09/12 03:29:12 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:12 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 3.928ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:12 client newly acked packets (1): [1] 2025/09/12 03:29:12 client updated RTT: 32.397ms (σ: 9.96ms) 2025/09/12 03:29:12 client ECN capability confirmed. 2025/09/12 03:29:12 client lost packet 0 (time threshold) 2025/09/12 03:29:12 client Canceling loss detection timer. 2025/09/12 03:29:12 client Ignoring all packets below 4. 2025/09/12 03:29:12 client -> Sending packet 3 (56 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 102.451µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:29:12 client -> Sending packet 5 (46 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client -> Sending packet 6 (46 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client <- Reading packet 9 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:12 client -> Sending packet 7 (39 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 64.992µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:12 client <- Reading packet 11 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:12 client Queuing ACK because there's a new missing packet to report. 2025/09/12 03:29:12 client -> Sending packet 8 (41 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 4, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 58.189µs, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 03:29:12 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:12 client -> Sending packet 9 (30 bytes) for connection acba3e6c6d4c44a4fd30, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: 66342f5b78fc2877, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:12 client Connection acba3e6c6d4c44a4fd30 closed. 2025/09/12 03:29:12 Requesting https://server4:443/gboyobgfkh. 2025/09/12 03:29:12 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:12 Increased send buffer size to 14336 kiB 2025/09/12 03:29:12 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:12 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:12 Created qlog file: /logs/qlog/962b4604501c388e07edf62b2923769d6b23819b.sqlog 2025/09/12 03:29:12 client Starting new connection to server4 ([::]:50093 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 962b4604501c388e07edf62b2923769d6b23819b, version v1 2025/09/12 03:29:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:12 client -> Sending packet 0 (1280 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: 962b4604501c388e07edf62b2923769d6b23819b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:12 client -> Sending packet 1 (1280 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: 962b4604501c388e07edf62b2923769d6b23819b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 1228, Data length: 288, Offset + Data length: 1516} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:29:12 client <- Reading packet 67439 (137 bytes) for connection (empty), Initial 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fc5ad1a908f8871f, Token: (empty), PacketNumber: 67439, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:29:12 client Received first packet. Switching destination connection ID to: fc5ad1a908f8871f 2025/09/12 03:29:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 336µs} 2025/09/12 03:29:12 client newly acked packets (2): [0 1] 2025/09/12 03:29:12 client updated RTT: 33.920613ms (σ: 16.960306ms) 2025/09/12 03:29:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 359 bytes. 2025/09/12 03:29:12 client <- Reading packet 0 (756 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fc5ad1a908f8871f, PacketNumber: 0, PacketNumberLen: 4, Length: 739, Version: v1} 2025/09/12 03:29:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 03:29:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 962b4604501c388e07edf62b2923769d6b23819b, InitialSourceConnectionID: fc5ad1a908f8871f, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xee5412ab3929f2650d3aebd06d0b7181, EnableResetStreamAt: false} 2025/09/12 03:29:12 client Parsed a coalesced packet. Part 3: 359 bytes. Remaining: 0 bytes. 2025/09/12 03:29:12 client <- Reading packet 1 (359 bytes) for connection (empty), Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fc5ad1a908f8871f, PacketNumber: 1, PacketNumberLen: 4, Length: 342, Version: v1} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b 2025/09/12 03:29:12 client Long Header{Type: Initial, DestConnectionID: fc5ad1a908f8871f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 67439, LowestAcked: 67439, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: fc5ad1a908f8871f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:12 client Dropping Initial keys. 2025/09/12 03:29:12 client -> Sending packet 1 (89 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, Handshake 2025/09/12 03:29:12 client Long Header{Type: Handshake, DestConnectionID: fc5ad1a908f8871f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:12 client Short Header{DestConnectionID: fc5ad1a908f8871f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:12 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:12 client <- &wire.PingFrame{} 2025/09/12 03:29:12 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:12 client -> Sending packet 1 (35 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:12 client Short Header{DestConnectionID: fc5ad1a908f8871f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 78.887µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:13 client -> Sending packet 2 (74 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, Handshake 2025/09/12 03:29:13 client Long Header{Type: Handshake, DestConnectionID: fc5ad1a908f8871f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:13 client -> Sending packet 3 (74 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, Handshake 2025/09/12 03:29:13 client Long Header{Type: Handshake, DestConnectionID: fc5ad1a908f8871f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:13 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:13 client <- &wire.NewTokenFrame{Token: 0xb6f4e483bdd3d854e85c993257dcc936db850daa2c7bbdb3b9d91622d1a6ea61d48593ce16769838c4a1737c6384ebd5e234} 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 079513364337c81d, StatelessResetToken: 0xbb9eb80f7de3aa063ded15953997c1f7} 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5b9500c52df45b9, StatelessResetToken: 0xb4b806a17c3788f3a586dfdd08edc90e} 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ebdac2b7c56dfda, StatelessResetToken: 0xe843783965e60db67d9a73e6ea5cece8} 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101.096ms} 2025/09/12 03:29:13 client Peer doesn't await address validation any longer. 2025/09/12 03:29:13 client newly acked packets (1): [0] 2025/09/12 03:29:13 client updated RTT: 45.066ms (σ: 35.013ms) 2025/09/12 03:29:13 client Canceling loss detection timer. 2025/09/12 03:29:13 client Dropping Handshake keys. 2025/09/12 03:29:13 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:13 client -> Sending packet 2 (37 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:13 client Short Header{DestConnectionID: 079513364337c81d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 164.728µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:13 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:13 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:13 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:13 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:13 client -> Sending packet 3 (30 bytes) for connection 962b4604501c388e07edf62b2923769d6b23819b, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:13 client Short Header{DestConnectionID: 079513364337c81d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:13 client Connection 962b4604501c388e07edf62b2923769d6b23819b closed. 2025/09/12 03:29:13 Requesting https://server4:443/pjqodhkdol. 2025/09/12 03:29:13 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:13 Increased send buffer size to 14336 kiB 2025/09/12 03:29:13 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:13 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:13 Created qlog file: /logs/qlog/656f1c6403f9d3e1.sqlog 2025/09/12 03:29:13 client Starting new connection to server4 ([::]:39713 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 656f1c6403f9d3e1, version v1 2025/09/12 03:29:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:13 client -> Sending packet 0 (1280 bytes) for connection 656f1c6403f9d3e1, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 656f1c6403f9d3e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:13 client -> Sending packet 1 (1280 bytes) for connection 656f1c6403f9d3e1, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 656f1c6403f9d3e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 1240, Data length: 271, Offset + Data length: 1511} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/09/12 03:29:13 client <- Reading packet 126705 (137 bytes) for connection (empty), Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 153beabc2b38ab93, Token: (empty), PacketNumber: 126705, PacketNumberLen: 4, Length: 119, Version: v1} 2025/09/12 03:29:13 client Received first packet. Switching destination connection ID to: 153beabc2b38ab93 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 352µs} 2025/09/12 03:29:13 client newly acked packets (2): [0 1] 2025/09/12 03:29:13 client updated RTT: 33.929174ms (σ: 16.964587ms) 2025/09/12 03:29:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 373 bytes. 2025/09/12 03:29:13 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/09/12 03:29:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 153beabc2b38ab93, PacketNumber: 0, PacketNumberLen: 4, Length: 725, Version: v1} 2025/09/12 03:29:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/09/12 03:29:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 656f1c6403f9d3e1, InitialSourceConnectionID: 153beabc2b38ab93, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xe31c4ad34bd6233a5b827b246e2e340d, EnableResetStreamAt: false} 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 3: 373 bytes. Remaining: 0 bytes. 2025/09/12 03:29:13 client <- Reading packet 1 (373 bytes) for connection (empty), Handshake 2025/09/12 03:29:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 153beabc2b38ab93, PacketNumber: 1, PacketNumberLen: 4, Length: 356, Version: v1} 2025/09/12 03:29:13 client <- &wire.PingFrame{} 2025/09/12 03:29:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 656f1c6403f9d3e1 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 153beabc2b38ab93, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:29:13 client -> &wire.AckFrame{LargestAcked: 126705, LowestAcked: 126705, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:13 client Long Header{Type: Handshake, DestConnectionID: 153beabc2b38ab93, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:13 client Dropping Initial keys. 2025/09/12 03:29:13 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:13 client <- &wire.NewTokenFrame{Token: 0xe68d2dc21b6f74d52e4dc288cc4789ae42c358a6dfd7ccd936ac4ee609fca9e02a7633b828ad52da4f4bbfb2f7b9e71307b9} 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c16e73cf0790246, StatelessResetToken: 0xcf4e02266d4c7ad6daa6a0d59883b7bf} 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 211364e28854559e, StatelessResetToken: 0xc50859fc672e564e7c2b69e4a0ab7746} 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 09bb7139a65c9a27, StatelessResetToken: 0x3c9d919b429f7b770adbdadbd2b4fdb2} 2025/09/12 03:29:13 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:13 client -> Sending packet 1 (91 bytes) for connection 656f1c6403f9d3e1, Handshake 2025/09/12 03:29:13 client Long Header{Type: Handshake, DestConnectionID: 9c16e73cf0790246, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:13 client Short Header{DestConnectionID: 9c16e73cf0790246, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:13 client -> Sending packet 1 (36 bytes) for connection 656f1c6403f9d3e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:13 client Short Header{DestConnectionID: 9c16e73cf0790246, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 711.777µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:13 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:13 client <- &wire.PingFrame{} 2025/09/12 03:29:13 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:13 client Sending ACK because the ACK timer expired. 2025/09/12 03:29:13 client -> Sending packet 2 (36 bytes) for connection 656f1c6403f9d3e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:13 client Short Header{DestConnectionID: 9c16e73cf0790246, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.305016ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 03:29:13 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 03:29:13 client Peer doesn't await address validation any longer. 2025/09/12 03:29:13 client newly acked packets (1): [0] 2025/09/12 03:29:13 client Canceling loss detection timer. 2025/09/12 03:29:13 client Dropping Handshake keys. 2025/09/12 03:29:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10920caa91e3c7bc, StatelessResetToken: 0x548a77c9051b16e4fdb15d9377c873ad} 2025/09/12 03:29:13 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:13 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:13 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:13 client -> Sending packet 3 (30 bytes) for connection 656f1c6403f9d3e1, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:13 client Short Header{DestConnectionID: 9c16e73cf0790246, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:13 client Connection 656f1c6403f9d3e1 closed. 2025/09/12 03:29:13 Requesting https://server4:443/hhjpyeiemi. 2025/09/12 03:29:13 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:13 Increased send buffer size to 14336 kiB 2025/09/12 03:29:13 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:13 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:13 Created qlog file: /logs/qlog/e49277194ce53a26cd6e6d413a7ac8bd99f160.sqlog 2025/09/12 03:29:13 client Starting new connection to server4 ([::]:54144 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e49277194ce53a26cd6e6d413a7ac8bd99f160, version v1 2025/09/12 03:29:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:13 client -> Sending packet 0 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: e49277194ce53a26cd6e6d413a7ac8bd99f160, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:13 client -> Sending packet 1 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: e49277194ce53a26cd6e6d413a7ac8bd99f160, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/12 03:29:13 client <- Reading packet 76842 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, Token: (empty), PacketNumber: 76842, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:13 client Received first packet. Switching destination connection ID to: 57e630935a8cb6f7 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/09/12 03:29:13 client newly acked packets (1): [0] 2025/09/12 03:29:13 client updated RTT: 31.776806ms (σ: 15.888403ms) 2025/09/12 03:29:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:13 client -> Sending packet 2 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/12 03:29:13 client -> Sending packet 3 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/12 03:29:13 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:13 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:13 client <- Reading packet 76844 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, Token: (empty), PacketNumber: 76844, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 03:29:13 client newly acked packets (1): [3] 2025/09/12 03:29:13 client updated RTT: 32.233ms (σ: 12.83ms) 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:13 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:13 client -> Sending packet 4 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:13 client -> &wire.PingFrame{} 2025/09/12 03:29:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:13 client <- Reading packet 76845 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, Token: (empty), PacketNumber: 76845, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/09/12 03:29:13 client newly acked packets (1): [4] 2025/09/12 03:29:13 client updated RTT: 32.297ms (σ: 9.751ms) 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:13 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:13 client -> Sending packet 5 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:13 client -> &wire.PingFrame{} 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:13 client <- Reading packet 76846 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, Token: (empty), PacketNumber: 76846, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:13 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/09/12 03:29:13 client newly acked packets (1): [5] 2025/09/12 03:29:13 client updated RTT: 32.373ms (σ: 7.465ms) 2025/09/12 03:29:13 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:13 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:14 client -> Sending packet 6 (1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:14 client -> &wire.PingFrame{} 2025/09/12 03:29:14 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/09/12 03:29:14 client <- Reading packet 76847 (183 bytes) for connection (empty), Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, Token: (empty), PacketNumber: 76847, PacketNumberLen: 4, Length: 165, Version: v1} 2025/09/12 03:29:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 03:29:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:14 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 500.168ms} 2025/09/12 03:29:14 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/09/12 03:29:14 client <- Reading packet 5 (1069 bytes) for connection (empty), Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, PacketNumber: 5, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/09/12 03:29:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 03:29:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 03:29:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e49277194ce53a26cd6e6d413a7ac8bd99f160, InitialSourceConnectionID: 57e630935a8cb6f7, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x23f0b621a6e5fed3e31e3e4d34e5ee90, EnableResetStreamAt: false} 2025/09/12 03:29:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 03:29:14 client -> &wire.AckFrame{LargestAcked: 76847, LowestAcked: 76842, AckRanges: {{Largest: 76847, Smallest: 76844}, {Largest: 76842, Smallest: 76842}}, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:14 client Dropping Initial keys. 2025/09/12 03:29:14 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:14 client <- &wire.PingFrame{} 2025/09/12 03:29:14 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 03:29:14 client <- Reading packet 2 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, PacketNumber: 2, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:14 client <- &wire.PingFrame{} 2025/09/12 03:29:14 client <- Reading packet 3 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, PacketNumber: 3, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:14 client <- &wire.PingFrame{} 2025/09/12 03:29:14 client <- Reading packet 4 (1197 bytes) for connection (empty), Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57e630935a8cb6f7, PacketNumber: 4, PacketNumberLen: 4, Length: 1180, Version: v1} 2025/09/12 03:29:14 client <- &wire.PingFrame{} 2025/09/12 03:29:14 client -> Sending packet 1 (89 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 03:29:14 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:14 client Short Header{DestConnectionID: 57e630935a8cb6f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:14 client -> Sending packet 1 (38 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:14 client Short Header{DestConnectionID: 57e630935a8cb6f7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.020554873s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 03:29:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 03:29:14 client -> Sending packet 2 (74 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:14 client -> Sending packet 3 (74 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, Handshake 2025/09/12 03:29:14 client Long Header{Type: Handshake, DestConnectionID: 57e630935a8cb6f7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 03:29:14 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:14 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:14 client <- &wire.NewTokenFrame{Token: 0xdb4d229e77e80157be0a477eb93ffaf9078e125624349facf7d74a70390869f4a9fcf133b115ff5b8ba2dc754028f93317c9} 2025/09/12 03:29:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d239d4e06602cd00, StatelessResetToken: 0x8272f6b6e23c1b58d79a50055be0c275} 2025/09/12 03:29:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d4351fc6a81e4164, StatelessResetToken: 0x482e2229ced5e4b76b9a149e9e7df382} 2025/09/12 03:29:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7bcdae828ba662cf, StatelessResetToken: 0x67272e79e78ad7639e2e472c9d85e16b} 2025/09/12 03:29:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:14 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:14 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:14 client <- &wire.HandshakeDoneFrame{} 2025/09/12 03:29:14 client Dropping Handshake keys. 2025/09/12 03:29:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 03:29:14 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 03:29:14 client -> Sending packet 3 (56 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:14 client Short Header{DestConnectionID: d239d4e06602cd00, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:14 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 170.348µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 03:29:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:14 client -> Sending packet 4 (48 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:14 client Short Header{DestConnectionID: d239d4e06602cd00, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 03:29:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 03:29:14 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:14 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:14 client <- &wire.PingFrame{} 2025/09/12 03:29:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:14 client Sending ACK because the ACK timer expired. 2025/09/12 03:29:14 client -> Sending packet 5 (36 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:14 client Short Header{DestConnectionID: d239d4e06602cd00, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:14 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 25.256257ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 03:29:14 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/09/12 03:29:14 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 03:29:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 03:29:14 client newly acked packets (1): [4] 2025/09/12 03:29:14 client updated RTT: 32.304ms (σ: 5.736ms) 2025/09/12 03:29:14 client ECN capability confirmed. 2025/09/12 03:29:14 client Canceling loss detection timer. 2025/09/12 03:29:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a84be147e449bbf5, StatelessResetToken: 0x7ce2446c0cbb1595e660f3de7a3b1604} 2025/09/12 03:29:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 03:29:14 client Setting ACK timer to max ack delay: 25ms 2025/09/12 03:29:14 client Closing connection with error: Application error 0x0 (local) 2025/09/12 03:29:14 client -> Sending packet 6 (30 bytes) for connection e49277194ce53a26cd6e6d413a7ac8bd99f160, 1-RTT (ECN: ECT(0)) 2025/09/12 03:29:14 client Short Header{DestConnectionID: d239d4e06602cd00, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 03:29:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 03:29:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 03:29:14 client Connection e49277194ce53a26cd6e6d413a7ac8bd99f160 closed. 2025/09/12 03:29:14 Requesting https://server4:443/uwzfamvhju. 2025/09/12 03:29:14 Increased receive buffer size to 14336 kiB 2025/09/12 03:29:14 Increased send buffer size to 14336 kiB 2025/09/12 03:29:14 Setting DF for IPv4 and IPv6. 2025/09/12 03:29:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 03:29:14 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 03:29:14 Created qlog file: /logs/qlog/778a54598842bfef6ffba26443eb91e657.sqlog 2025/09/12 03:29:14 client Starting new connection to server4 ([::]:45142 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 778a54598842bfef6ffba26443eb91e657, version v1 2025/09/12 03:29:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 03:29:14 client -> Sending packet 0 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: 778a54598842bfef6ffba26443eb91e657, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 03:29:14 client -> Sending packet 1 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: 778a54598842bfef6ffba26443eb91e657, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 03:29:14 client <- Reading packet 87154 (43 bytes) for connection (empty), Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a4dd05cb64bd9ab9, Token: (empty), PacketNumber: 87154, PacketNumberLen: 4, Length: 25, Version: v1} 2025/09/12 03:29:14 client Received first packet. Switching destination connection ID to: a4dd05cb64bd9ab9 2025/09/12 03:29:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168µs} 2025/09/12 03:29:14 client newly acked packets (1): [0] 2025/09/12 03:29:14 client updated RTT: 31.762239ms (σ: 15.881119ms) 2025/09/12 03:29:14 client Queueing packet (183 bytes) for later decryption 2025/09/12 03:29:14 client Queueing packet (1452 bytes) for later decryption 2025/09/12 03:29:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 03:29:14 client -> Sending packet 2 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:14 client -> Sending packet 3 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 03:29:14 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 03:29:14 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:14 client <- Reading packet 87156 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a4dd05cb64bd9ab9, Token: (empty), PacketNumber: 87156, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 03:29:14 client newly acked packets (1): [3] 2025/09/12 03:29:14 client updated RTT: 32.006ms (σ: 12.399ms) 2025/09/12 03:29:14 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:14 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 03:29:14 client -> Sending packet 4 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:14 client -> &wire.PingFrame{} 2025/09/12 03:29:14 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:14 client <- Reading packet 87157 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a4dd05cb64bd9ab9, Token: (empty), PacketNumber: 87157, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 56µs} 2025/09/12 03:29:14 client newly acked packets (1): [4] 2025/09/12 03:29:14 client updated RTT: 32.103ms (σ: 9.493ms) 2025/09/12 03:29:14 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:14 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:15 client -> Sending packet 5 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:15 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:15 client -> &wire.PingFrame{} 2025/09/12 03:29:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 03:29:15 client -> Sending packet 6 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:15 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:15 client -> &wire.PingFrame{} 2025/09/12 03:29:15 client -> Sending packet 7 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:15 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:15 client -> &wire.PingFrame{} 2025/09/12 03:29:15 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:15 client <- Reading packet 87159 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a4dd05cb64bd9ab9, Token: (empty), PacketNumber: 87159, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:15 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 48µs} 2025/09/12 03:29:15 client newly acked packets (1): [7] 2025/09/12 03:29:15 client updated RTT: 32.316ms (σ: 7.545ms) 2025/09/12 03:29:15 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:15 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:16 client -> Sending packet 8 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:16 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:16 client -> &wire.PingFrame{} 2025/09/12 03:29:16 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:16 client <- Reading packet 87161 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a4dd05cb64bd9ab9, Token: (empty), PacketNumber: 87161, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:16 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 64µs} 2025/09/12 03:29:16 client newly acked packets (1): [8] 2025/09/12 03:29:16 client updated RTT: 32.381ms (σ: 5.79ms) 2025/09/12 03:29:16 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:16 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:18 client -> Sending packet 9 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:18 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:18 client -> &wire.PingFrame{} 2025/09/12 03:29:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 7 2025/09/12 03:29:21 client -> Sending packet 10 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:21 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:21 client -> &wire.PingFrame{} 2025/09/12 03:29:21 client -> Sending packet 11 (1280 bytes) for connection 778a54598842bfef6ffba26443eb91e657, Initial 2025/09/12 03:29:21 client Long Header{Type: Initial, DestConnectionID: a4dd05cb64bd9ab9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 03:29:21 client -> &wire.PingFrame{} 2025/09/12 03:29:22 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 1197 bytes. 2025/09/12 03:29:22 client <- Reading packet 87165 (55 bytes) for connection (empty), Initial 2025/09/12 03:29:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a4dd05cb64bd9ab9, Token: (empty), PacketNumber: 87165, PacketNumberLen: 4, Length: 37, Version: v1} 2025/09/12 03:29:22 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}}, DelayTime: 112µs} 2025/09/12 03:29:22 client Parsed a coalesced packet. Part 2: 1197 bytes. Remaining: 0 bytes. 2025/09/12 03:29:22 client Queueing packet (1197 bytes) for later decryption 2025/09/12 03:29:24 client Destroying connection: timeout: handshake did not complete in time 2025/09/12 03:29:24 Removing connection ID (empty). 2025/09/12 03:29:24 client Connection 778a54598842bfef6ffba26443eb91e657 closed.