2025/04/30 09:12:28 Requesting https://server4:443/wwxzdpujug. 2025/04/30 09:12:28 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:28 Increased send buffer size to 14336 kiB 2025/04/30 09:12:28 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:28 Created qlog file: /logs/qlog/3e82fc2b4b1ae5dbdc9cec7061ff.sqlog 2025/04/30 09:12:28 client Starting new connection to server4 ([::]:33695 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3e82fc2b4b1ae5dbdc9cec7061ff, version v1 2025/04/30 09:12:28 Adding connection ID (empty). 2025/04/30 09:12:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:28 client -> Sending packet 0 (1280 bytes) for connection 3e82fc2b4b1ae5dbdc9cec7061ff, Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 3e82fc2b4b1ae5dbdc9cec7061ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:28 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:12:28 client <- Reading packet 102564 (138 bytes) for connection (empty), Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4c668f2513b1232f, Token: (empty), PacketNumber: 102564, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:12:28 client Received first packet. Switching destination connection ID to: 4c668f2513b1232f 2025/04/30 09:12:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 09:12:28 client newly acked packets (1): [0] 2025/04/30 09:12:28 client updated RTT: 38.483348ms (σ: 19.241674ms) 2025/04/30 09:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:28 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 365 bytes. 2025/04/30 09:12:28 client <- Reading packet 0 (749 bytes) for connection (empty), Handshake 2025/04/30 09:12:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4c668f2513b1232f, PacketNumber: 0, PacketNumberLen: 4, Length: 732, Version: v1} 2025/04/30 09:12:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:12:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3e82fc2b4b1ae5dbdc9cec7061ff, InitialSourceConnectionID: 4c668f2513b1232f, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb97eaf673832d641d128c26553afca09} 2025/04/30 09:12:28 client Parsed a coalesced packet. Part 3: 365 bytes. Remaining: 0 bytes. 2025/04/30 09:12:28 client <- Reading packet 1 (365 bytes) for connection (empty), Handshake 2025/04/30 09:12:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4c668f2513b1232f, PacketNumber: 1, PacketNumberLen: 4, Length: 348, Version: v1} 2025/04/30 09:12:28 client <- &wire.PingFrame{} 2025/04/30 09:12:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3e82fc2b4b1ae5dbdc9cec7061ff 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 4c668f2513b1232f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:28 client -> &wire.AckFrame{LargestAcked: 102564, LowestAcked: 102564, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:28 client Long Header{Type: Handshake, DestConnectionID: 4c668f2513b1232f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:28 client Dropping Initial keys. 2025/04/30 09:12:28 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:28 client <- &wire.NewTokenFrame{Token: 0xbc0355714d0337d8955639ffe4cfa4b77ef6cd5e233437286498034cd96bab8e2024642697a6bad00b6293bcaf04e9b13e59} 2025/04/30 09:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 783ea28f025ac2ff, StatelessResetToken: 0x4074806b63fb3ce1d3e37c20e9bf39ee} 2025/04/30 09:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eea111d0540ae6c1, StatelessResetToken: 0x6c30530e812fcfe6607c090b6a58cc8c} 2025/04/30 09:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0c0a4575dbb7732e, StatelessResetToken: 0xcdb52642ccdf2f9da4efdf5c6c5bcb59} 2025/04/30 09:12:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:28 client -> Sending packet 1 (91 bytes) for connection 3e82fc2b4b1ae5dbdc9cec7061ff, Handshake 2025/04/30 09:12:28 client Long Header{Type: Handshake, DestConnectionID: 783ea28f025ac2ff, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:28 client Short Header{DestConnectionID: 783ea28f025ac2ff, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:28 client -> Sending packet 1 (36 bytes) for connection 3e82fc2b4b1ae5dbdc9cec7061ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:28 client Short Header{DestConnectionID: 783ea28f025ac2ff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 678.197µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:28 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:28 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: abcf8f193ee9ad2d, StatelessResetToken: 0x4aad1137d168c3878bdf93670d7c28f0} 2025/04/30 09:12:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:28 client Dropping Handshake keys. 2025/04/30 09:12:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:28 client -> Sending packet 2 (37 bytes) for connection 3e82fc2b4b1ae5dbdc9cec7061ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:28 client Short Header{DestConnectionID: 783ea28f025ac2ff, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:28 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 147.676µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:28 client -> Sending packet 3 (30 bytes) for connection 3e82fc2b4b1ae5dbdc9cec7061ff, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:28 client Short Header{DestConnectionID: 783ea28f025ac2ff, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:28 client Connection 3e82fc2b4b1ae5dbdc9cec7061ff closed. 2025/04/30 09:12:28 Requesting https://server4:443/ulazwsmghc. 2025/04/30 09:12:28 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:28 Increased send buffer size to 14336 kiB 2025/04/30 09:12:28 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:28 Created qlog file: /logs/qlog/0a502a3b8cca8d058bee0a6cab533f817b.sqlog 2025/04/30 09:12:28 client Starting new connection to server4 ([::]:38282 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0a502a3b8cca8d058bee0a6cab533f817b, version v1 2025/04/30 09:12:28 Adding connection ID (empty). 2025/04/30 09:12:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:28 client -> Sending packet 0 (1280 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 0a502a3b8cca8d058bee0a6cab533f817b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:28 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:28 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:28 client -> Sending packet 1 (1280 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 0a502a3b8cca8d058bee0a6cab533f817b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:28 client -> Sending packet 2 (1280 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 0a502a3b8cca8d058bee0a6cab533f817b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:28 client -> Sending packet 3 (1280 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 0a502a3b8cca8d058bee0a6cab533f817b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:28 client -> Sending packet 4 (1280 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Initial 2025/04/30 09:12:28 client Long Header{Type: Initial, DestConnectionID: 0a502a3b8cca8d058bee0a6cab533f817b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:29 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:29 client <- Reading packet 88869 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 24bec71d21c46015, Token: (empty), PacketNumber: 88869, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:29 client Received first packet. Switching destination connection ID to: 24bec71d21c46015 2025/04/30 09:12:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:29 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 500.584ms} 2025/04/30 09:12:29 client newly acked packets (1): [4] 2025/04/30 09:12:29 client updated RTT: 534.440287ms (σ: 267.220143ms) 2025/04/30 09:12:29 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:29 client <- Reading packet 4 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24bec71d21c46015, PacketNumber: 4, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:29 client <- &wire.PingFrame{} 2025/04/30 09:12:29 client -> Sending packet 5 (1280 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Initial 2025/04/30 09:12:29 client Long Header{Type: Initial, DestConnectionID: 24bec71d21c46015, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:29 client -> &wire.AckFrame{LargestAcked: 88869, LowestAcked: 88869, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:29 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:29 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:29 client -> Sending packet 0 (43 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: 24bec71d21c46015, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:29 client Dropping Initial keys. 2025/04/30 09:12:29 client Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 823 bytes. 2025/04/30 09:12:29 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24bec71d21c46015, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:29 client <- &wire.PingFrame{} 2025/04/30 09:12:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 48µs} 2025/04/30 09:12:29 client Peer doesn't await address validation any longer. 2025/04/30 09:12:29 client Canceling loss detection timer. 2025/04/30 09:12:29 client Parsed a coalesced packet. Part 2: 823 bytes. Remaining: 0 bytes. 2025/04/30 09:12:29 client <- Reading packet 6 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24bec71d21c46015, PacketNumber: 6, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:12:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0a502a3b8cca8d058bee0a6cab533f817b, InitialSourceConnectionID: 24bec71d21c46015, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb1f19491dc80ebe8d9f95a8b878255e2} 2025/04/30 09:12:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 48µs} 2025/04/30 09:12:29 client -> Sending packet 1 (82 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: 24bec71d21c46015, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:29 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:29 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:29 client <- &wire.NewTokenFrame{Token: 0xd73a1b69b0ea72b804ecda58b1707527f73ef7a970f9f5493e326971d25a8858c295bd11a56e937288033fe675e5590282bf} 2025/04/30 09:12:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c5d29b0e831228fe, StatelessResetToken: 0x162ea679f637a36b8c7c82cf4ec27caf} 2025/04/30 09:12:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf02b6cc94c1bf6e, StatelessResetToken: 0xe5e702ae0c5c5feb0b7f7d02cd70fbcf} 2025/04/30 09:12:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 72f40e886d4c3836, StatelessResetToken: 0x1aeec40f51cdc78ae9776a840e4845ac} 2025/04/30 09:12:29 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:29 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:29 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:29 client <- &wire.PingFrame{} 2025/04/30 09:12:29 client <- Reading packet 7 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24bec71d21c46015, PacketNumber: 7, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:29 client <- &wire.PingFrame{} 2025/04/30 09:12:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 48µs} 2025/04/30 09:12:29 client -> Sending packet 2 (91 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Handshake 2025/04/30 09:12:29 client Long Header{Type: Handshake, DestConnectionID: c5d29b0e831228fe, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:29 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:29 client Short Header{DestConnectionID: c5d29b0e831228fe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:29 client -> Sending packet 1 (38 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:29 client Short Header{DestConnectionID: c5d29b0e831228fe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.135184379s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:30 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 09:12:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:30 client -> Sending packet 3 (74 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Handshake 2025/04/30 09:12:30 client Long Header{Type: Handshake, DestConnectionID: c5d29b0e831228fe, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:30 client -> Sending packet 4 (74 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, Handshake 2025/04/30 09:12:30 client Long Header{Type: Handshake, DestConnectionID: c5d29b0e831228fe, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:30 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:30 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:30 client Dropping Handshake keys. 2025/04/30 09:12:30 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:30 client -> Sending packet 3 (58 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:30 client Short Header{DestConnectionID: c5d29b0e831228fe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:30 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 89.276µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:30 client -> Sending packet 4 (48 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:30 client Short Header{DestConnectionID: c5d29b0e831228fe, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:30 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:30 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:30 client <- &wire.PingFrame{} 2025/04/30 09:12:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:30 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:30 client -> Sending packet 5 (38 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:30 client Short Header{DestConnectionID: c5d29b0e831228fe, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:30 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.254383ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:30 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:30 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 168µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5cf471aeb953848a, StatelessResetToken: 0xd7963370e2caaa887fd938d932b39761} 2025/04/30 09:12:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:30 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:30 client -> Sending packet 6 (30 bytes) for connection 0a502a3b8cca8d058bee0a6cab533f817b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:30 client Short Header{DestConnectionID: c5d29b0e831228fe, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:30 client Connection 0a502a3b8cca8d058bee0a6cab533f817b closed. 2025/04/30 09:12:30 Requesting https://server4:443/zljiivyvco. 2025/04/30 09:12:30 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:30 Increased send buffer size to 14336 kiB 2025/04/30 09:12:30 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:30 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:30 Created qlog file: /logs/qlog/61d5cabab70f7678f44d9b1ca0cd4dca0d0b15.sqlog 2025/04/30 09:12:30 client Starting new connection to server4 ([::]:52660 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, version v1 2025/04/30 09:12:30 Adding connection ID (empty). 2025/04/30 09:12:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:30 client -> Sending packet 0 (1280 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, Initial 2025/04/30 09:12:30 client Long Header{Type: Initial, DestConnectionID: 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:12:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:31 client -> Sending packet 1 (1280 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, Initial 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:31 client -> Sending packet 2 (1280 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, Initial 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:31 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:31 client <- Reading packet 122480 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 812f922724813758, Token: (empty), PacketNumber: 122480, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:31 client Received first packet. Switching destination connection ID to: 812f922724813758 2025/04/30 09:12:31 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 440µs} 2025/04/30 09:12:31 client newly acked packets (1): [2] 2025/04/30 09:12:31 client updated RTT: 34.115014ms (σ: 17.057507ms) 2025/04/30 09:12:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Parsed a coalesced packet. Part 2: 754 bytes. Remaining: 361 bytes. 2025/04/30 09:12:31 client <- Reading packet 0 (754 bytes) for connection (empty), Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 812f922724813758, PacketNumber: 0, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:12:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:12:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, InitialSourceConnectionID: 812f922724813758, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xaee15adeff979abc2df6e18c8298b831} 2025/04/30 09:12:31 client Parsed a coalesced packet. Part 3: 361 bytes. Remaining: 0 bytes. 2025/04/30 09:12:31 client <- Reading packet 1 (361 bytes) for connection (empty), Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 812f922724813758, PacketNumber: 1, PacketNumberLen: 4, Length: 344, Version: v1} 2025/04/30 09:12:31 client <- &wire.PingFrame{} 2025/04/30 09:12:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: 812f922724813758, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 122480, LowestAcked: 122480, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 812f922724813758, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client Dropping Initial keys. 2025/04/30 09:12:31 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.NewTokenFrame{Token: 0x8c24bbd379be6caadc0905b04e988c7cf73f57e618cfa883a30c628f90fef481a461c8e9cb0fbaeaa60f4ef0dc98b1eabcfa} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7fba6cf9cea501b2, StatelessResetToken: 0x95aefb2b57b301f4ae4ece6a2a364c7a} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f6a96b1814217866, StatelessResetToken: 0xeb3660ed9234c5ed72dd7abea668c858} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3da396e197aff406, StatelessResetToken: 0x2fd8f05fc708021139cb366f6c404aff} 2025/04/30 09:12:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:31 client -> Sending packet 1 (91 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 7fba6cf9cea501b2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:31 client Short Header{DestConnectionID: 7fba6cf9cea501b2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:31 client -> Sending packet 1 (36 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:31 client Short Header{DestConnectionID: 7fba6cf9cea501b2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 577.719µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:31 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.PingFrame{} 2025/04/30 09:12:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:31 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:31 client -> Sending packet 2 (36 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:31 client Short Header{DestConnectionID: 7fba6cf9cea501b2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.29681ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:31 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:31 client Peer doesn't await address validation any longer. 2025/04/30 09:12:31 client newly acked packets (1): [0] 2025/04/30 09:12:31 client Canceling loss detection timer. 2025/04/30 09:12:31 client Dropping Handshake keys. 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: db3f5c0a830a5a6b, StatelessResetToken: 0x6d3e1b9668eb1d3e095ac508526ffbdf} 2025/04/30 09:12:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:31 client -> Sending packet 3 (30 bytes) for connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:31 client Short Header{DestConnectionID: 7fba6cf9cea501b2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:31 client Connection 61d5cabab70f7678f44d9b1ca0cd4dca0d0b15 closed. 2025/04/30 09:12:31 Requesting https://server4:443/rmxnzitmdh. 2025/04/30 09:12:31 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:31 Increased send buffer size to 14336 kiB 2025/04/30 09:12:31 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:31 Created qlog file: /logs/qlog/cfccf5673dae647166a623c6.sqlog 2025/04/30 09:12:31 client Starting new connection to server4 ([::]:33591 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cfccf5673dae647166a623c6, version v1 2025/04/30 09:12:31 Adding connection ID (empty). 2025/04/30 09:12:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:31 client -> Sending packet 0 (1280 bytes) for connection cfccf5673dae647166a623c6, Initial 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: cfccf5673dae647166a623c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:12:31 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:31 client <- Reading packet 72996 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d859d271d0d0092a, Token: (empty), PacketNumber: 72996, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:31 client Received first packet. Switching destination connection ID to: d859d271d0d0092a 2025/04/30 09:12:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 09:12:31 client newly acked packets (1): [0] 2025/04/30 09:12:31 client updated RTT: 32.99238ms (σ: 16.49619ms) 2025/04/30 09:12:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 368 bytes. 2025/04/30 09:12:31 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d859d271d0d0092a, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/04/30 09:12:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:12:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cfccf5673dae647166a623c6, InitialSourceConnectionID: d859d271d0d0092a, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa80da0cde5782a9ebc5c2b38320eead5} 2025/04/30 09:12:31 client Parsed a coalesced packet. Part 3: 368 bytes. Remaining: 0 bytes. 2025/04/30 09:12:31 client <- Reading packet 1 (368 bytes) for connection (empty), Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d859d271d0d0092a, PacketNumber: 1, PacketNumberLen: 4, Length: 351, Version: v1} 2025/04/30 09:12:31 client <- &wire.PingFrame{} 2025/04/30 09:12:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cfccf5673dae647166a623c6 2025/04/30 09:12:31 client Long Header{Type: Initial, DestConnectionID: d859d271d0d0092a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 72996, LowestAcked: 72996, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: d859d271d0d0092a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client Dropping Initial keys. 2025/04/30 09:12:31 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.NewTokenFrame{Token: 0xb6d0023ae65f8a4c53f882c7a7d4d56731307b58b97709599639778c68d08bb0a29b9b9448a7e702a5e546960a27216b1ce8} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0ea3ded51c501579, StatelessResetToken: 0xc08d21262bc60fd01136b3fb66b6702d} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a272917f2226c76, StatelessResetToken: 0x305b984024e93a2f7d8467b5d36a78cc} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bce91e6c612f9aa6, StatelessResetToken: 0x3d5300d95a48a5051888e36f75038fd9} 2025/04/30 09:12:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:31 client -> Sending packet 1 (91 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:31 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:31 client -> Sending packet 1 (36 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:31 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 699.703µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:31 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.PingFrame{} 2025/04/30 09:12:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:31 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:31 client -> Sending packet 2 (36 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:31 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.244706ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:31 client -> Sending packet 2 (74 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client -> Sending packet 3 (74 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:12:31 client -> Sending packet 4 (74 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client -> Sending packet 5 (74 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.NewTokenFrame{Token: 0xb6d0023ae65f8a4c53f882c7a7d4d56731307b58b97709599639778c68d08bb0a29b9b9448a7e702a5e546960a27216b1ce8} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0ea3ded51c501579, StatelessResetToken: 0xc08d21262bc60fd01136b3fb66b6702d} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a272917f2226c76, StatelessResetToken: 0x305b984024e93a2f7d8467b5d36a78cc} 2025/04/30 09:12:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bce91e6c612f9aa6, StatelessResetToken: 0x3d5300d95a48a5051888e36f75038fd9} 2025/04/30 09:12:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:31 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:31 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:31 client <- &wire.PingFrame{} 2025/04/30 09:12:31 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:31 client -> Sending packet 3 (37 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:31 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 69.91µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 09:12:31 client -> Sending packet 6 (74 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:31 client -> Sending packet 7 (74 bytes) for connection cfccf5673dae647166a623c6, Handshake 2025/04/30 09:12:31 client Long Header{Type: Handshake, DestConnectionID: 0ea3ded51c501579, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:32 client <- Reading packet 5 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.NewTokenFrame{Token: 0xb6d0023ae65f8a4c53f882c7a7d4d56731307b58b97709599639778c68d08bb0a29b9b9448a7e702a5e546960a27216b1ce8} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0ea3ded51c501579, StatelessResetToken: 0xc08d21262bc60fd01136b3fb66b6702d} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a272917f2226c76, StatelessResetToken: 0x305b984024e93a2f7d8467b5d36a78cc} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bce91e6c612f9aa6, StatelessResetToken: 0x3d5300d95a48a5051888e36f75038fd9} 2025/04/30 09:12:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:32 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:32 client -> Sending packet 4 (38 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 25.267588ms, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:32 client <- Reading packet 8 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:32 client Dropping Handshake keys. 2025/04/30 09:12:32 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 166.544ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:32 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:32 client -> Sending packet 6 (60 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 105.086µs, ECT0: 0, ECT1: 6, CE: 0} 2025/04/30 09:12:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:32 client -> Sending packet 7 (48 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:32 client <- Reading packet 9 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.PingFrame{} 2025/04/30 09:12:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:32 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:32 client -> Sending packet 8 (40 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 25.245066ms, ECT0: 0, ECT1: 7, CE: 0} 2025/04/30 09:12:32 client <- Reading packet 11 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0cb1303d46336121, StatelessResetToken: 0x58c937778ab34b8db48985b487f14bbc} 2025/04/30 09:12:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:32 client -> Sending packet 9 (41 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 85.479µs, ECT0: 0, ECT1: 8, CE: 0} 2025/04/30 09:12:32 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:32 client -> Sending packet 10 (30 bytes) for connection cfccf5673dae647166a623c6, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: 0ea3ded51c501579, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:32 client Connection cfccf5673dae647166a623c6 closed. 2025/04/30 09:12:32 Requesting https://server4:443/lplpemsugd. 2025/04/30 09:12:32 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:32 Increased send buffer size to 14336 kiB 2025/04/30 09:12:32 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:32 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:32 Created qlog file: /logs/qlog/ac0fcba9d1ccc751abdb.sqlog 2025/04/30 09:12:32 client Starting new connection to server4 ([::]:38564 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ac0fcba9d1ccc751abdb, version v1 2025/04/30 09:12:32 Adding connection ID (empty). 2025/04/30 09:12:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:32 client -> Sending packet 0 (1280 bytes) for connection ac0fcba9d1ccc751abdb, Initial 2025/04/30 09:12:32 client Long Header{Type: Initial, DestConnectionID: ac0fcba9d1ccc751abdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:32 client -> Sending packet 1 (1280 bytes) for connection ac0fcba9d1ccc751abdb, Initial 2025/04/30 09:12:32 client Long Header{Type: Initial, DestConnectionID: ac0fcba9d1ccc751abdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:32 client -> Sending packet 2 (1280 bytes) for connection ac0fcba9d1ccc751abdb, Initial 2025/04/30 09:12:32 client Long Header{Type: Initial, DestConnectionID: ac0fcba9d1ccc751abdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:32 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:32 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:32 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:32 client <- Reading packet 112896 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cff14581cac70bc2, Token: (empty), PacketNumber: 112896, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:32 client Received first packet. Switching destination connection ID to: cff14581cac70bc2 2025/04/30 09:12:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:32 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:32 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:32 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 40µs} 2025/04/30 09:12:32 client newly acked packets (1): [2] 2025/04/30 09:12:32 client updated RTT: 35.601102ms (σ: 17.800551ms) 2025/04/30 09:12:32 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:32 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cff14581cac70bc2, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:32 client <- &wire.PingFrame{} 2025/04/30 09:12:32 client -> Sending packet 3 (1280 bytes) for connection ac0fcba9d1ccc751abdb, Initial 2025/04/30 09:12:32 client Long Header{Type: Initial, DestConnectionID: cff14581cac70bc2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 112896, LowestAcked: 112896, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:32 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:32 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:32 client -> Sending packet 0 (43 bytes) for connection ac0fcba9d1ccc751abdb, Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: cff14581cac70bc2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:32 client Dropping Initial keys. 2025/04/30 09:12:32 client -> Sending packet 1 (37 bytes) for connection ac0fcba9d1ccc751abdb, Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: cff14581cac70bc2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 09:12:32 client -> &wire.PingFrame{} 2025/04/30 09:12:32 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cff14581cac70bc2, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:12:32 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:32 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ac0fcba9d1ccc751abdb, InitialSourceConnectionID: cff14581cac70bc2, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1449160699a74ff77dc44b7662cf7576} 2025/04/30 09:12:32 client -> Sending packet 2 (82 bytes) for connection ac0fcba9d1ccc751abdb, Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: cff14581cac70bc2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:32 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.NewTokenFrame{Token: 0xeb69c1dd83f636d9a39b607d475bc69712c3795176872c51164fbd5c46b67d172ca23d9509ec9e6a954060808549a4f94e1d} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e297ebe799643e13, StatelessResetToken: 0xe8fb709d98b20406e29a31f90c6a493b} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c812426ddf12ef8, StatelessResetToken: 0xf02eb5366128b1c38876954347611e2d} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 13861ed42c0ad18f, StatelessResetToken: 0xa306a3a001d1ae7cde8a29f4138dc0d3} 2025/04/30 09:12:32 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:32 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.PingFrame{} 2025/04/30 09:12:32 client -> Sending packet 0 (57 bytes) for connection ac0fcba9d1ccc751abdb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: e297ebe799643e13, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 112.606445ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:32 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cff14581cac70bc2, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 56µs} 2025/04/30 09:12:32 client Peer doesn't await address validation any longer. 2025/04/30 09:12:32 client newly acked packets (1): [1] 2025/04/30 09:12:32 client updated RTT: 34.991ms (σ: 14.568ms) 2025/04/30 09:12:32 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:32 client -> Sending packet 3 (74 bytes) for connection ac0fcba9d1ccc751abdb, Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: e297ebe799643e13, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:32 client -> Sending packet 4 (74 bytes) for connection ac0fcba9d1ccc751abdb, Handshake 2025/04/30 09:12:32 client Long Header{Type: Handshake, DestConnectionID: e297ebe799643e13, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:32 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:32 client Dropping Handshake keys. 2025/04/30 09:12:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:32 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:32 client -> Sending packet 2 (58 bytes) for connection ac0fcba9d1ccc751abdb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: e297ebe799643e13, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 92.461µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:32 client -> Sending packet 3 (48 bytes) for connection ac0fcba9d1ccc751abdb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: e297ebe799643e13, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:32 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.PingFrame{} 2025/04/30 09:12:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:32 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:32 client -> Sending packet 4 (38 bytes) for connection ac0fcba9d1ccc751abdb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: e297ebe799643e13, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.232141ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:32 client <- Reading packet 6 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:32 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4a1bafbf2e8e2b88, StatelessResetToken: 0xcc3bc815cb88fd80e5eb41aa00f4e285} 2025/04/30 09:12:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:32 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:32 client -> Sending packet 5 (39 bytes) for connection ac0fcba9d1ccc751abdb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: e297ebe799643e13, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 83.356µs, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:32 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:32 client -> Sending packet 6 (30 bytes) for connection ac0fcba9d1ccc751abdb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:32 client Short Header{DestConnectionID: e297ebe799643e13, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:32 client Connection ac0fcba9d1ccc751abdb closed. 2025/04/30 09:12:32 Requesting https://server4:443/hoqtcpdxsa. 2025/04/30 09:12:32 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:32 Increased send buffer size to 14336 kiB 2025/04/30 09:12:32 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:32 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:32 Created qlog file: /logs/qlog/35822f16143a59508d2403aac811b41f11.sqlog 2025/04/30 09:12:32 client Starting new connection to server4 ([::]:40872 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 35822f16143a59508d2403aac811b41f11, version v1 2025/04/30 09:12:32 Adding connection ID (empty). 2025/04/30 09:12:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:32 client -> Sending packet 0 (1280 bytes) for connection 35822f16143a59508d2403aac811b41f11, Initial 2025/04/30 09:12:32 client Long Header{Type: Initial, DestConnectionID: 35822f16143a59508d2403aac811b41f11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:33 client -> Sending packet 1 (1280 bytes) for connection 35822f16143a59508d2403aac811b41f11, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 35822f16143a59508d2403aac811b41f11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client -> Sending packet 2 (1280 bytes) for connection 35822f16143a59508d2403aac811b41f11, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 35822f16143a59508d2403aac811b41f11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:33 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:33 client -> Sending packet 3 (1280 bytes) for connection 35822f16143a59508d2403aac811b41f11, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 35822f16143a59508d2403aac811b41f11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client -> Sending packet 4 (1280 bytes) for connection 35822f16143a59508d2403aac811b41f11, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 35822f16143a59508d2403aac811b41f11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:33 client <- Reading packet 95590 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 201a237288a526e2, Token: (empty), PacketNumber: 95590, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:33 client Received first packet. Switching destination connection ID to: 201a237288a526e2 2025/04/30 09:12:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 72µs} 2025/04/30 09:12:33 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:33 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 201a237288a526e2, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:12:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 35822f16143a59508d2403aac811b41f11, InitialSourceConnectionID: 201a237288a526e2, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xda41c712bbbe6a0489ee750dd2ae9100} 2025/04/30 09:12:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 35822f16143a59508d2403aac811b41f11 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 201a237288a526e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 95590, LowestAcked: 95590, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: 201a237288a526e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:33 client Dropping Initial keys. 2025/04/30 09:12:33 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.PingFrame{} 2025/04/30 09:12:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:33 client -> Sending packet 1 (43 bytes) for connection 35822f16143a59508d2403aac811b41f11, Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: 201a237288a526e2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:33 client -> Sending packet 0 (57 bytes) for connection 35822f16143a59508d2403aac811b41f11, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: 201a237288a526e2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 399.004128ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:33 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:33 client Peer doesn't await address validation any longer. 2025/04/30 09:12:33 client newly acked packets (1): [0] 2025/04/30 09:12:33 client updated RTT: 32.76095ms (σ: 16.380475ms) 2025/04/30 09:12:33 client ECN capability confirmed. 2025/04/30 09:12:33 client Canceling loss detection timer. 2025/04/30 09:12:33 client Dropping Handshake keys. 2025/04/30 09:12:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:33 client Ignoring all packets below 2. 2025/04/30 09:12:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:33 client -> Sending packet 1 (30 bytes) for connection 35822f16143a59508d2403aac811b41f11, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: 201a237288a526e2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:33 client Connection 35822f16143a59508d2403aac811b41f11 closed. 2025/04/30 09:12:33 Requesting https://server4:443/anezrfuyrp. 2025/04/30 09:12:33 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:33 Increased send buffer size to 14336 kiB 2025/04/30 09:12:33 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:33 Created qlog file: /logs/qlog/9f7cc9c06fd9356c618189b72d.sqlog 2025/04/30 09:12:33 client Starting new connection to server4 ([::]:34791 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9f7cc9c06fd9356c618189b72d, version v1 2025/04/30 09:12:33 Adding connection ID (empty). 2025/04/30 09:12:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:33 client -> Sending packet 0 (1280 bytes) for connection 9f7cc9c06fd9356c618189b72d, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 9f7cc9c06fd9356c618189b72d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:33 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:33 client -> Sending packet 1 (1280 bytes) for connection 9f7cc9c06fd9356c618189b72d, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 9f7cc9c06fd9356c618189b72d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client -> Sending packet 2 (1280 bytes) for connection 9f7cc9c06fd9356c618189b72d, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 9f7cc9c06fd9356c618189b72d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:33 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:33 client <- Reading packet 127125 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d519a9cd9d6545b, Token: (empty), PacketNumber: 127125, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:33 client Received first packet. Switching destination connection ID to: 8d519a9cd9d6545b 2025/04/30 09:12:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/04/30 09:12:33 client newly acked packets (1): [2] 2025/04/30 09:12:33 client updated RTT: 33.769798ms (σ: 16.884899ms) 2025/04/30 09:12:33 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:33 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d519a9cd9d6545b, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:33 client <- &wire.PingFrame{} 2025/04/30 09:12:33 client -> Sending packet 3 (1280 bytes) for connection 9f7cc9c06fd9356c618189b72d, Initial 2025/04/30 09:12:33 client Long Header{Type: Initial, DestConnectionID: 8d519a9cd9d6545b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 127125, LowestAcked: 127125, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:33 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:33 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:33 client -> Sending packet 0 (43 bytes) for connection 9f7cc9c06fd9356c618189b72d, Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: 8d519a9cd9d6545b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:33 client Dropping Initial keys. 2025/04/30 09:12:33 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:33 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d519a9cd9d6545b, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 09:12:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9f7cc9c06fd9356c618189b72d, InitialSourceConnectionID: 8d519a9cd9d6545b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf08201e7cd1be06e13a14333d837703a} 2025/04/30 09:12:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 32µs} 2025/04/30 09:12:33 client Peer doesn't await address validation any longer. 2025/04/30 09:12:33 client Canceling loss detection timer. 2025/04/30 09:12:33 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:33 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d519a9cd9d6545b, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:33 client <- &wire.PingFrame{} 2025/04/30 09:12:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 32µs} 2025/04/30 09:12:33 client -> Sending packet 1 (82 bytes) for connection 9f7cc9c06fd9356c618189b72d, Handshake 2025/04/30 09:12:33 client Long Header{Type: Handshake, DestConnectionID: 8d519a9cd9d6545b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:33 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.NewTokenFrame{Token: 0x9759ac02c1ead3c08e2b12148f08197dfe605de62396376abcf9112dd5a7ec3cece2e0be19bf4fb5e4779329a9a9640072d6} 2025/04/30 09:12:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8979f3353d765a4, StatelessResetToken: 0x2e9245cc19a980328c19928602f524f2} 2025/04/30 09:12:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff52ac057d3c3b2f, StatelessResetToken: 0xbc2caa0370fb81944a4f2f3f73b11857} 2025/04/30 09:12:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c9026d2002f6180, StatelessResetToken: 0x1a9833aef41b62a96cee89969a820772} 2025/04/30 09:12:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:33 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.PingFrame{} 2025/04/30 09:12:33 client -> Sending packet 0 (59 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 233.282193ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:33 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.NewTokenFrame{Token: 0x9759ac02c1ead3c08e2b12148f08197dfe605de62396376abcf9112dd5a7ec3cece2e0be19bf4fb5e4779329a9a9640072d6} 2025/04/30 09:12:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8979f3353d765a4, StatelessResetToken: 0x2e9245cc19a980328c19928602f524f2} 2025/04/30 09:12:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff52ac057d3c3b2f, StatelessResetToken: 0xbc2caa0370fb81944a4f2f3f73b11857} 2025/04/30 09:12:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c9026d2002f6180, StatelessResetToken: 0x1a9833aef41b62a96cee89969a820772} 2025/04/30 09:12:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:33 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:33 client Dropping Handshake keys. 2025/04/30 09:12:33 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:33 client -> Sending packet 1 (35 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 56.985µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:33 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.PingFrame{} 2025/04/30 09:12:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:33 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:33 client -> Sending packet 2 (36 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 25.222765ms, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:33 client -> Sending packet 4 (48 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:33 client -> Sending packet 5 (48 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:33 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:33 client <- Reading packet 5 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:33 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:34 client <- Reading packet 6 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.NewTokenFrame{Token: 0x9759ac02c1ead3c08e2b12148f08197dfe605de62396376abcf9112dd5a7ec3cece2e0be19bf4fb5e4779329a9a9640072d6} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8979f3353d765a4, StatelessResetToken: 0x2e9245cc19a980328c19928602f524f2} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff52ac057d3c3b2f, StatelessResetToken: 0xbc2caa0370fb81944a4f2f3f73b11857} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c9026d2002f6180, StatelessResetToken: 0x1a9833aef41b62a96cee89969a820772} 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 175.144ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:34 client -> Sending packet 6 (1360 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.PingFrame{} 2025/04/30 09:12:34 client <- Reading packet 7 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 32e7b7f86f6c11a7, StatelessResetToken: 0x19e6808697b15a34f1c036a65b7e98ea} 2025/04/30 09:12:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:34 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:34 client -> Sending packet 7 (35 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 82.694µs, ECT0: 0, ECT1: 8, CE: 0} 2025/04/30 09:12:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:34 client -> Sending packet 8 (30 bytes) for connection 9f7cc9c06fd9356c618189b72d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: a8979f3353d765a4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:34 client Connection 9f7cc9c06fd9356c618189b72d closed. 2025/04/30 09:12:34 Requesting https://server4:443/wdytxodqtb. 2025/04/30 09:12:34 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:34 Increased send buffer size to 14336 kiB 2025/04/30 09:12:34 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:34 Created qlog file: /logs/qlog/1123cab6d19b2c29da08b1a16b5a25db4500cdc7.sqlog 2025/04/30 09:12:34 client Starting new connection to server4 ([::]:51853 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, version v1 2025/04/30 09:12:34 Adding connection ID (empty). 2025/04/30 09:12:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:34 client -> Sending packet 0 (1280 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:34 client -> Sending packet 1 (1280 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:34 client -> Sending packet 2 (1280 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:34 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:34 client <- Reading packet 102490 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07f8fce08d8d388, Token: (empty), PacketNumber: 102490, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:34 client Received first packet. Switching destination connection ID to: c07f8fce08d8d388 2025/04/30 09:12:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 48µs} 2025/04/30 09:12:34 client newly acked packets (1): [2] 2025/04/30 09:12:34 client updated RTT: 35.590599ms (σ: 17.795299ms) 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:34 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c07f8fce08d8d388, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:34 client <- &wire.PingFrame{} 2025/04/30 09:12:34 client -> Sending packet 3 (1280 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: c07f8fce08d8d388, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 102490, LowestAcked: 102490, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:34 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:34 client -> Sending packet 0 (43 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: c07f8fce08d8d388, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:34 client Dropping Initial keys. 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:34 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c07f8fce08d8d388, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:12:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, InitialSourceConnectionID: c07f8fce08d8d388, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa76f67a86f8a157da2b1208739dfd55a} 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.584ms} 2025/04/30 09:12:34 client Peer doesn't await address validation any longer. 2025/04/30 09:12:34 client Canceling loss detection timer. 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:34 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c07f8fce08d8d388, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:34 client <- &wire.PingFrame{} 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.584ms} 2025/04/30 09:12:34 client -> Sending packet 1 (128 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: c07f8fce08d8d388, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:34 client Short Header{DestConnectionID: c07f8fce08d8d388, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:34 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.NewTokenFrame{Token: 0xe3ae690310215277b0a7123e280ad36a6bc103f2374bba8ede58f7fafcb26a4ff1153f004269eb2cc58e9d0dd46a46599ca3} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44b1da857e7c11f9, StatelessResetToken: 0x09c8512a5359fe7cc5f4830ff9b1a615} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c41b984ccf93b33e, StatelessResetToken: 0xdb1f09ddb804ea12b9dcecbd7238fa09} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2fdbb84697dc2e29, StatelessResetToken: 0x977674a1ea8bb3fff9797eb856e9d967} 2025/04/30 09:12:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:34 client -> Sending packet 1 (38 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: 44b1da857e7c11f9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 66.026053ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:34 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:34 client newly acked packets (2): [0 1] 2025/04/30 09:12:34 client updated RTT: 35.12ms (σ: 14.284ms) 2025/04/30 09:12:34 client ECN capability confirmed. 2025/04/30 09:12:34 client Canceling loss detection timer. 2025/04/30 09:12:34 client Dropping Handshake keys. 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a15128626e6505ca, StatelessResetToken: 0x78af370c28c7ca7c180a072c5ee76bdb} 2025/04/30 09:12:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:34 client Ignoring all packets below 1. 2025/04/30 09:12:34 client -> Sending packet 2 (35 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: 44b1da857e7c11f9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 155.46µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:34 client -> Sending packet 3 (30 bytes) for connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: 44b1da857e7c11f9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:34 client Connection 1123cab6d19b2c29da08b1a16b5a25db4500cdc7 closed. 2025/04/30 09:12:34 Requesting https://server4:443/rittfrqony. 2025/04/30 09:12:34 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:34 Increased send buffer size to 14336 kiB 2025/04/30 09:12:34 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:34 Created qlog file: /logs/qlog/534628b3f86670fc8d50.sqlog 2025/04/30 09:12:34 client Starting new connection to server4 ([::]:37173 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 534628b3f86670fc8d50, version v1 2025/04/30 09:12:34 Adding connection ID (empty). 2025/04/30 09:12:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:34 client -> Sending packet 0 (1280 bytes) for connection 534628b3f86670fc8d50, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 534628b3f86670fc8d50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:34 client -> Sending packet 1 (1280 bytes) for connection 534628b3f86670fc8d50, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 534628b3f86670fc8d50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:34 client -> Sending packet 2 (1280 bytes) for connection 534628b3f86670fc8d50, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 534628b3f86670fc8d50, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:34 client <- Reading packet 71377 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d9eadf699783b787, Token: (empty), PacketNumber: 71377, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:34 client Received first packet. Switching destination connection ID to: d9eadf699783b787 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 504µs} 2025/04/30 09:12:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 369 bytes. 2025/04/30 09:12:34 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d9eadf699783b787, PacketNumber: 0, PacketNumberLen: 4, Length: 729, Version: v1} 2025/04/30 09:12:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:12:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 534628b3f86670fc8d50, InitialSourceConnectionID: d9eadf699783b787, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x24bfa436841c6ba7a8c4b7614fe5800a} 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 3: 369 bytes. Remaining: 0 bytes. 2025/04/30 09:12:34 client <- Reading packet 1 (369 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d9eadf699783b787, PacketNumber: 1, PacketNumberLen: 4, Length: 352, Version: v1} 2025/04/30 09:12:34 client <- &wire.PingFrame{} 2025/04/30 09:12:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 534628b3f86670fc8d50 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: d9eadf699783b787, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 71377, LowestAcked: 71377, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: d9eadf699783b787, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:34 client Dropping Initial keys. 2025/04/30 09:12:34 client -> Sending packet 1 (89 bytes) for connection 534628b3f86670fc8d50, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: d9eadf699783b787, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:34 client Short Header{DestConnectionID: d9eadf699783b787, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:34 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.PingFrame{} 2025/04/30 09:12:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:34 client -> Sending packet 1 (35 bytes) for connection 534628b3f86670fc8d50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: d9eadf699783b787, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 67.766µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:34 client <- Reading packet 3 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d9eadf699783b787, PacketNumber: 3, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:34 client <- &wire.PingFrame{} 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 76.688ms} 2025/04/30 09:12:34 client Peer doesn't await address validation any longer. 2025/04/30 09:12:34 client -> Sending packet 2 (45 bytes) for connection 534628b3f86670fc8d50, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: d9eadf699783b787, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:34 client -> Sending packet 3 (74 bytes) for connection 534628b3f86670fc8d50, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: d9eadf699783b787, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:34 client -> Sending packet 4 (74 bytes) for connection 534628b3f86670fc8d50, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: d9eadf699783b787, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:34 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.NewTokenFrame{Token: 0xaf77719d5b933077790185fb17b108dbcdfda32ca708e7c1972d99b844357e6bd90f31b256fad086b2f5ebe5acdb44cde034} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6ac0fb54e946c56a, StatelessResetToken: 0x942aed8bd3bdf5f44de45e313a89dae2} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2892cd17ce71a6cb, StatelessResetToken: 0x46f70b9713a3c20f297c5a7f2f87e4ee} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99454d8d19b82cea, StatelessResetToken: 0xb3544b8ff924c331043b05120f500203} 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 199.992ms} 2025/04/30 09:12:34 client newly acked packets (1): [0] 2025/04/30 09:12:34 client updated RTT: 231.904841ms (σ: 115.95242ms) 2025/04/30 09:12:34 client Canceling loss detection timer. 2025/04/30 09:12:34 client Dropping Handshake keys. 2025/04/30 09:12:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:34 client -> Sending packet 2 (37 bytes) for connection 534628b3f86670fc8d50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: 6ac0fb54e946c56a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 132.567µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:34 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:34 client -> Sending packet 3 (30 bytes) for connection 534628b3f86670fc8d50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: 6ac0fb54e946c56a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:34 client Connection 534628b3f86670fc8d50 closed. 2025/04/30 09:12:34 Requesting https://server4:443/ecgagctahl. 2025/04/30 09:12:34 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:34 Increased send buffer size to 14336 kiB 2025/04/30 09:12:34 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:34 Created qlog file: /logs/qlog/3adef8143ae0161a85c0.sqlog 2025/04/30 09:12:34 client Starting new connection to server4 ([::]:51692 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3adef8143ae0161a85c0, version v1 2025/04/30 09:12:34 Adding connection ID (empty). 2025/04/30 09:12:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:34 client -> Sending packet 0 (1280 bytes) for connection 3adef8143ae0161a85c0, Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: 3adef8143ae0161a85c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:34 client <- Reading packet 69245 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ee04290feccc40fc, Token: (empty), PacketNumber: 69245, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:34 client Received first packet. Switching destination connection ID to: ee04290feccc40fc 2025/04/30 09:12:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 09:12:34 client newly acked packets (1): [0] 2025/04/30 09:12:34 client updated RTT: 32.985699ms (σ: 16.492849ms) 2025/04/30 09:12:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 371 bytes. 2025/04/30 09:12:34 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ee04290feccc40fc, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/04/30 09:12:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3adef8143ae0161a85c0, InitialSourceConnectionID: ee04290feccc40fc, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xaefe1becd03904985d42e33136ebcf6e} 2025/04/30 09:12:34 client Parsed a coalesced packet. Part 3: 371 bytes. Remaining: 0 bytes. 2025/04/30 09:12:34 client <- Reading packet 1 (371 bytes) for connection (empty), Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ee04290feccc40fc, PacketNumber: 1, PacketNumberLen: 4, Length: 354, Version: v1} 2025/04/30 09:12:34 client <- &wire.PingFrame{} 2025/04/30 09:12:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3adef8143ae0161a85c0 2025/04/30 09:12:34 client Long Header{Type: Initial, DestConnectionID: ee04290feccc40fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 69245, LowestAcked: 69245, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: ee04290feccc40fc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:34 client Dropping Initial keys. 2025/04/30 09:12:34 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:34 client <- &wire.NewTokenFrame{Token: 0x9be521d9bdcf5bf34a80ed82b0ba9800d9f99c35d4b71e9b21b635f6173c7af6d70b7bfa4f6aad9d7b1dbea22587fd231e0f} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c055fc379c41fb81, StatelessResetToken: 0xa4a7210defdb3f0402c129507c7fa5a4} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 61e0c940524e3ccf, StatelessResetToken: 0x130720d89ee2bd8656dfc50e5639e991} 2025/04/30 09:12:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5ac03ef6df70c0d, StatelessResetToken: 0x550180c8b5a257b255d6372673fee7b2} 2025/04/30 09:12:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:34 client -> Sending packet 1 (91 bytes) for connection 3adef8143ae0161a85c0, Handshake 2025/04/30 09:12:34 client Long Header{Type: Handshake, DestConnectionID: c055fc379c41fb81, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:34 client Short Header{DestConnectionID: c055fc379c41fb81, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:34 client -> Sending packet 1 (36 bytes) for connection 3adef8143ae0161a85c0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:34 client Short Header{DestConnectionID: c055fc379c41fb81, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 518.647µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:35 client -> Sending packet 2 (74 bytes) for connection 3adef8143ae0161a85c0, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: c055fc379c41fb81, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:35 client -> Sending packet 3 (74 bytes) for connection 3adef8143ae0161a85c0, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: c055fc379c41fb81, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:35 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.NewTokenFrame{Token: 0x9be521d9bdcf5bf34a80ed82b0ba9800d9f99c35d4b71e9b21b635f6173c7af6d70b7bfa4f6aad9d7b1dbea22587fd231e0f} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c055fc379c41fb81, StatelessResetToken: 0xa4a7210defdb3f0402c129507c7fa5a4} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 61e0c940524e3ccf, StatelessResetToken: 0x130720d89ee2bd8656dfc50e5639e991} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5ac03ef6df70c0d, StatelessResetToken: 0x550180c8b5a257b255d6372673fee7b2} 2025/04/30 09:12:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:35 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:35 client Dropping Handshake keys. 2025/04/30 09:12:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:35 client -> Sending packet 3 (58 bytes) for connection 3adef8143ae0161a85c0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: c055fc379c41fb81, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 149.579µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:35 client -> Sending packet 4 (48 bytes) for connection 3adef8143ae0161a85c0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: c055fc379c41fb81, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:35 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:35 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:35 client -> Sending packet 5 (38 bytes) for connection 3adef8143ae0161a85c0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: c055fc379c41fb81, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.234185ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:35 client <- Reading packet 5 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:35 client newly acked packets (1): [4] 2025/04/30 09:12:35 client updated RTT: 32.703ms (σ: 12.932ms) 2025/04/30 09:12:35 client ECN capability confirmed. 2025/04/30 09:12:35 client Canceling loss detection timer. 2025/04/30 09:12:35 client <- Reading packet 6 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9696eced2819328e, StatelessResetToken: 0x079975616662e12f0be3213032310a43} 2025/04/30 09:12:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:35 client -> Sending packet 6 (30 bytes) for connection 3adef8143ae0161a85c0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: c055fc379c41fb81, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:35 client Connection 3adef8143ae0161a85c0 closed. 2025/04/30 09:12:35 Requesting https://server4:443/yrfawxbgfp. 2025/04/30 09:12:35 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:35 Increased send buffer size to 14336 kiB 2025/04/30 09:12:35 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:35 Created qlog file: /logs/qlog/43c37d9a2d2a7aec.sqlog 2025/04/30 09:12:35 client Starting new connection to server4 ([::]:36530 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 43c37d9a2d2a7aec, version v1 2025/04/30 09:12:35 Adding connection ID (empty). 2025/04/30 09:12:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:35 client -> Sending packet 0 (1280 bytes) for connection 43c37d9a2d2a7aec, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: 43c37d9a2d2a7aec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:35 client <- Reading packet 99924 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 20750bdaf5c5a1e0, Token: (empty), PacketNumber: 99924, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:35 client Received first packet. Switching destination connection ID to: 20750bdaf5c5a1e0 2025/04/30 09:12:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/04/30 09:12:35 client newly acked packets (1): [0] 2025/04/30 09:12:35 client updated RTT: 32.990237ms (σ: 16.495118ms) 2025/04/30 09:12:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 372 bytes. 2025/04/30 09:12:35 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 20750bdaf5c5a1e0, PacketNumber: 0, PacketNumberLen: 4, Length: 726, Version: v1} 2025/04/30 09:12:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 43c37d9a2d2a7aec, InitialSourceConnectionID: 20750bdaf5c5a1e0, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xeeab5da4a7baa8482a1131190905a53a} 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 3: 372 bytes. Remaining: 0 bytes. 2025/04/30 09:12:35 client <- Reading packet 1 (372 bytes) for connection (empty), Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 20750bdaf5c5a1e0, PacketNumber: 1, PacketNumberLen: 4, Length: 355, Version: v1} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 43c37d9a2d2a7aec 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: 20750bdaf5c5a1e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 99924, LowestAcked: 99924, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: 20750bdaf5c5a1e0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:35 client Dropping Initial keys. 2025/04/30 09:12:35 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.NewTokenFrame{Token: 0xe2e44bd8f6404844156640d1341123e4020ce2386b171f1ae8e5808e6935585468d2903f211a64a94e06839b19786bca2c6d} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b587379d22cf4397, StatelessResetToken: 0x54fd75bea7b34a19f41cee63705002fa} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e9b53ca35f939365, StatelessResetToken: 0x5889c805b7c24a79fd3d9925e062adf5} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7dc2320e895da26d, StatelessResetToken: 0x7be96cb80ce49aa9d41f90c0511f8590} 2025/04/30 09:12:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:35 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client -> Sending packet 1 (91 bytes) for connection 43c37d9a2d2a7aec, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: b587379d22cf4397, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:35 client Short Header{DestConnectionID: b587379d22cf4397, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:35 client -> Sending packet 1 (35 bytes) for connection 43c37d9a2d2a7aec, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: b587379d22cf4397, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 397.271µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:35 client -> Sending packet 2 (74 bytes) for connection 43c37d9a2d2a7aec, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: b587379d22cf4397, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:35 client -> Sending packet 3 (74 bytes) for connection 43c37d9a2d2a7aec, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: b587379d22cf4397, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:35 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:35 client Dropping Handshake keys. 2025/04/30 09:12:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:35 client -> Sending packet 3 (56 bytes) for connection 43c37d9a2d2a7aec, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: b587379d22cf4397, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 102.542µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:35 client -> Sending packet 4 (48 bytes) for connection 43c37d9a2d2a7aec, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: b587379d22cf4397, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:35 client <- Reading packet 4 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ff668ad059528787, StatelessResetToken: 0x403e66d62449dc351c416ee232fd2c77} 2025/04/30 09:12:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:35 client -> Sending packet 5 (37 bytes) for connection 43c37d9a2d2a7aec, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: b587379d22cf4397, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 86.702µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:35 client -> Sending packet 6 (30 bytes) for connection 43c37d9a2d2a7aec, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: b587379d22cf4397, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:35 client Connection 43c37d9a2d2a7aec closed. 2025/04/30 09:12:35 Requesting https://server4:443/asxjerfryq. 2025/04/30 09:12:35 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:35 Increased send buffer size to 14336 kiB 2025/04/30 09:12:35 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:35 Created qlog file: /logs/qlog/8c00c75206e902667b.sqlog 2025/04/30 09:12:35 client Starting new connection to server4 ([::]:43769 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8c00c75206e902667b, version v1 2025/04/30 09:12:35 Adding connection ID (empty). 2025/04/30 09:12:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:35 client -> Sending packet 0 (1280 bytes) for connection 8c00c75206e902667b, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: 8c00c75206e902667b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:35 client -> Sending packet 1 (1280 bytes) for connection 8c00c75206e902667b, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: 8c00c75206e902667b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:35 client -> Sending packet 2 (1280 bytes) for connection 8c00c75206e902667b, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: 8c00c75206e902667b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:35 client <- Reading packet 89117 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9720c0feb2bdc1d, Token: (empty), PacketNumber: 89117, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:35 client Received first packet. Switching destination connection ID to: c9720c0feb2bdc1d 2025/04/30 09:12:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 504µs} 2025/04/30 09:12:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 371 bytes. 2025/04/30 09:12:35 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c9720c0feb2bdc1d, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/04/30 09:12:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8c00c75206e902667b, InitialSourceConnectionID: c9720c0feb2bdc1d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xa1b43aa1a58829f4a8aa52d75ccefe48} 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 3: 371 bytes. Remaining: 0 bytes. 2025/04/30 09:12:35 client <- Reading packet 1 (371 bytes) for connection (empty), Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c9720c0feb2bdc1d, PacketNumber: 1, PacketNumberLen: 4, Length: 354, Version: v1} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8c00c75206e902667b 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: c9720c0feb2bdc1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1142, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 89117, LowestAcked: 89117, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: c9720c0feb2bdc1d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:35 client Short Header{DestConnectionID: c9720c0feb2bdc1d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:35 client Dropping Initial keys. 2025/04/30 09:12:35 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.NewTokenFrame{Token: 0xa4f55105dab88bbe487a934904aad5c0eeef3aef8b2d96ad2e50b478eec0f819f3b4bbb5570caad3bd10172792fd0ef54758} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05a20a797620a31f, StatelessResetToken: 0x02d05c5cb6342a2f7c6d1b3ded713faa} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 33908baf02b98402, StatelessResetToken: 0x518681e61528b19027c3825880e67485} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 709c92f883a46443, StatelessResetToken: 0x7121d561b1e983223bebb463128cb778} 2025/04/30 09:12:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:35 client -> Sending packet 1 (72 bytes) for connection 8c00c75206e902667b, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: 05a20a797620a31f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:35 client Short Header{DestConnectionID: 05a20a797620a31f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:35 client -> Sending packet 2 (36 bytes) for connection 8c00c75206e902667b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: 05a20a797620a31f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 649.921µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:35 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:35 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:35 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c9720c0feb2bdc1d, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client -> Sending packet 2 (43 bytes) for connection 8c00c75206e902667b, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: 05a20a797620a31f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:35 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:35 client -> Sending packet 3 (36 bytes) for connection 8c00c75206e902667b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: 05a20a797620a31f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.336177ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:35 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 351b95cc7b2395b4, StatelessResetToken: 0x1c8191ba95a1dd10a46a44b5f1a9f4f5} 2025/04/30 09:12:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:35 client Dropping Handshake keys. 2025/04/30 09:12:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:35 client -> Sending packet 4 (1360 bytes) for connection 8c00c75206e902667b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: 05a20a797620a31f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.PingFrame{} 2025/04/30 09:12:35 client -> Sending packet 5 (37 bytes) for connection 8c00c75206e902667b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: 05a20a797620a31f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 142.086µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:35 client -> Sending packet 6 (30 bytes) for connection 8c00c75206e902667b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:35 client Short Header{DestConnectionID: 05a20a797620a31f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:35 client Connection 8c00c75206e902667b closed. 2025/04/30 09:12:35 Requesting https://server4:443/zuvhrrloqo. 2025/04/30 09:12:35 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:35 Increased send buffer size to 14336 kiB 2025/04/30 09:12:35 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:35 Created qlog file: /logs/qlog/e9b456eb48d3d2d8cf970e6beb436a.sqlog 2025/04/30 09:12:35 client Starting new connection to server4 ([::]:59806 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e9b456eb48d3d2d8cf970e6beb436a, version v1 2025/04/30 09:12:35 Adding connection ID (empty). 2025/04/30 09:12:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:35 client -> Sending packet 0 (1280 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: e9b456eb48d3d2d8cf970e6beb436a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:35 client -> Sending packet 1 (1280 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: e9b456eb48d3d2d8cf970e6beb436a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:35 client -> Sending packet 2 (1280 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: e9b456eb48d3d2d8cf970e6beb436a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:35 client <- Reading packet 130810 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c657d764100847e3, Token: (empty), PacketNumber: 130810, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:35 client Received first packet. Switching destination connection ID to: c657d764100847e3 2025/04/30 09:12:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 24µs} 2025/04/30 09:12:35 client newly acked packets (1): [2] 2025/04/30 09:12:35 client updated RTT: 35.497247ms (σ: 17.748623ms) 2025/04/30 09:12:35 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:35 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c657d764100847e3, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:35 client <- &wire.PingFrame{} 2025/04/30 09:12:35 client -> Sending packet 3 (1280 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Initial 2025/04/30 09:12:35 client Long Header{Type: Initial, DestConnectionID: c657d764100847e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 130810, LowestAcked: 130810, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:35 client -> Sending packet 0 (43 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: c657d764100847e3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:35 client Dropping Initial keys. 2025/04/30 09:12:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:35 client -> Sending packet 1 (37 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Handshake 2025/04/30 09:12:35 client Long Header{Type: Handshake, DestConnectionID: c657d764100847e3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 09:12:35 client -> &wire.PingFrame{} 2025/04/30 09:12:36 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c657d764100847e3, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs} 2025/04/30 09:12:36 client Peer doesn't await address validation any longer. 2025/04/30 09:12:36 client newly acked packets (1): [1] 2025/04/30 09:12:36 client updated RTT: 34.898ms (σ: 14.507ms) 2025/04/30 09:12:36 client Canceling loss detection timer. 2025/04/30 09:12:36 client <- Reading packet 6 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c657d764100847e3, PacketNumber: 6, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:12:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e9b456eb48d3d2d8cf970e6beb436a, InitialSourceConnectionID: c657d764100847e3, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x403eae695c57f3c523772ce233feb8ac} 2025/04/30 09:12:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 100.056ms} 2025/04/30 09:12:36 client -> Sending packet 2 (84 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: c657d764100847e3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:36 client -> Sending packet 0 (46 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: c657d764100847e3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:36 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.NewTokenFrame{Token: 0x83b6a3d747612745c8f2b395841b6c886b15873c43226eb2d2335145563ca0279af96de8149cc08ea94764efe824ef5a1ca5} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: baa14683062d3f44, StatelessResetToken: 0x7c3d888121be8ea69eaa144b8306b296} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9dc10e1c961ea062, StatelessResetToken: 0x94d2563fd2907553d2e4748162a410cf} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4bc57a30c675039c, StatelessResetToken: 0x289c0d7f9bf43aa75835bfa432bf7b9c} 2025/04/30 09:12:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 72µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:36 client newly acked packets (1): [0] 2025/04/30 09:12:36 client updated RTT: 34.386ms (σ: 11.903ms) 2025/04/30 09:12:36 client ECN capability confirmed. 2025/04/30 09:12:36 client Canceling loss detection timer. 2025/04/30 09:12:36 client Dropping Handshake keys. 2025/04/30 09:12:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:36 client -> Sending packet 1 (37 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: baa14683062d3f44, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 140.402µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:36 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:36 client -> Sending packet 2 (30 bytes) for connection e9b456eb48d3d2d8cf970e6beb436a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: baa14683062d3f44, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:36 client Connection e9b456eb48d3d2d8cf970e6beb436a closed. 2025/04/30 09:12:36 Requesting https://server4:443/jeketfkwln. 2025/04/30 09:12:36 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:36 Increased send buffer size to 14336 kiB 2025/04/30 09:12:36 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:36 Created qlog file: /logs/qlog/9841769469994100f7.sqlog 2025/04/30 09:12:36 client Starting new connection to server4 ([::]:35488 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9841769469994100f7, version v1 2025/04/30 09:12:36 Adding connection ID (empty). 2025/04/30 09:12:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:36 client -> Sending packet 0 (1280 bytes) for connection 9841769469994100f7, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: 9841769469994100f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:12:36 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:36 client <- Reading packet 80304 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4de4ebcdd93f6dfe, Token: (empty), PacketNumber: 80304, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:36 client Received first packet. Switching destination connection ID to: 4de4ebcdd93f6dfe 2025/04/30 09:12:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 09:12:36 client newly acked packets (1): [0] 2025/04/30 09:12:36 client updated RTT: 33.018643ms (σ: 16.509321ms) 2025/04/30 09:12:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 371 bytes. 2025/04/30 09:12:36 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4de4ebcdd93f6dfe, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/04/30 09:12:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9841769469994100f7, InitialSourceConnectionID: 4de4ebcdd93f6dfe, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x27b6576a957c7af28f2359e5830cde26} 2025/04/30 09:12:36 client Parsed a coalesced packet. Part 3: 371 bytes. Remaining: 0 bytes. 2025/04/30 09:12:36 client <- Reading packet 1 (371 bytes) for connection (empty), Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4de4ebcdd93f6dfe, PacketNumber: 1, PacketNumberLen: 4, Length: 354, Version: v1} 2025/04/30 09:12:36 client <- &wire.PingFrame{} 2025/04/30 09:12:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9841769469994100f7 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: 4de4ebcdd93f6dfe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 80304, LowestAcked: 80304, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: 4de4ebcdd93f6dfe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:36 client Dropping Initial keys. 2025/04/30 09:12:36 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.NewTokenFrame{Token: 0xdd303079cd66feccc363610105c2297439c0bb2d8187d2e95249c6d2af699f2202003515aea407de943a8fbab000406ac527} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c6fe3cba86e5faf3, StatelessResetToken: 0x3cd3e9831b4b79bdaf3815cc9d99705e} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 89fbd727920ffe8c, StatelessResetToken: 0x32eb8af33752bd4511815786218f2ffc} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e6a8d7bcd4c5789, StatelessResetToken: 0xa2346dbbd5030fed713edce442d746ed} 2025/04/30 09:12:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:36 client -> Sending packet 1 (91 bytes) for connection 9841769469994100f7, Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: c6fe3cba86e5faf3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:36 client Short Header{DestConnectionID: c6fe3cba86e5faf3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:36 client -> Sending packet 1 (36 bytes) for connection 9841769469994100f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: c6fe3cba86e5faf3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 614.615µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:36 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.PingFrame{} 2025/04/30 09:12:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:36 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:36 client -> Sending packet 2 (36 bytes) for connection 9841769469994100f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: c6fe3cba86e5faf3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.21936ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:36 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9f01c5b93d937513, StatelessResetToken: 0xea6d8737100135744384f1e787a64317} 2025/04/30 09:12:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:36 client Dropping Handshake keys. 2025/04/30 09:12:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:36 client -> Sending packet 3 (37 bytes) for connection 9841769469994100f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: c6fe3cba86e5faf3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 106.378µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:36 client -> Sending packet 4 (30 bytes) for connection 9841769469994100f7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: c6fe3cba86e5faf3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:36 client Connection 9841769469994100f7 closed. 2025/04/30 09:12:36 Requesting https://server4:443/xytrokseht. 2025/04/30 09:12:36 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:36 Increased send buffer size to 14336 kiB 2025/04/30 09:12:36 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:36 Created qlog file: /logs/qlog/b29474bca96bd3b5.sqlog 2025/04/30 09:12:36 client Starting new connection to server4 ([::]:58050 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b29474bca96bd3b5, version v1 2025/04/30 09:12:36 Adding connection ID (empty). 2025/04/30 09:12:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:36 client -> Sending packet 0 (1280 bytes) for connection b29474bca96bd3b5, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: b29474bca96bd3b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:36 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:36 client <- Reading packet 108135 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e8c5232c6fe49fd0, Token: (empty), PacketNumber: 108135, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:36 client Received first packet. Switching destination connection ID to: e8c5232c6fe49fd0 2025/04/30 09:12:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/04/30 09:12:36 client newly acked packets (1): [0] 2025/04/30 09:12:36 client updated RTT: 32.969062ms (σ: 16.484531ms) 2025/04/30 09:12:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 373 bytes. 2025/04/30 09:12:36 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e8c5232c6fe49fd0, PacketNumber: 0, PacketNumberLen: 4, Length: 725, Version: v1} 2025/04/30 09:12:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 09:12:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b29474bca96bd3b5, InitialSourceConnectionID: e8c5232c6fe49fd0, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf6f4f01ff7b191e7bd4f1af44b2764b8} 2025/04/30 09:12:36 client Parsed a coalesced packet. Part 3: 373 bytes. Remaining: 0 bytes. 2025/04/30 09:12:36 client <- Reading packet 1 (373 bytes) for connection (empty), Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e8c5232c6fe49fd0, PacketNumber: 1, PacketNumberLen: 4, Length: 356, Version: v1} 2025/04/30 09:12:36 client <- &wire.PingFrame{} 2025/04/30 09:12:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b29474bca96bd3b5 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: e8c5232c6fe49fd0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 108135, LowestAcked: 108135, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: e8c5232c6fe49fd0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:36 client Dropping Initial keys. 2025/04/30 09:12:36 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.NewTokenFrame{Token: 0xaf91b88cd7eb9d724f77cc9ed179adb76e8eab4cdb31414b467bd5bb22fdf2e387c44500c3a66a0f1b6b25e1ffc56dcb7381} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e9422f84a2fad50c, StatelessResetToken: 0x8e07f24c8bc494e0e372ade2378186ea} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b267cf2e58a7d5f, StatelessResetToken: 0x47705565cfa19525f6b277c9116d2e63} 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8f854e84d2142f6, StatelessResetToken: 0x86d476669d12ece0945c3e537b4cf797} 2025/04/30 09:12:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:36 client -> Sending packet 1 (91 bytes) for connection b29474bca96bd3b5, Handshake 2025/04/30 09:12:36 client Long Header{Type: Handshake, DestConnectionID: e9422f84a2fad50c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:36 client -> Sending packet 1 (36 bytes) for connection b29474bca96bd3b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 599.871µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:36 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:36 client Dropping Handshake keys. 2025/04/30 09:12:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:36 client -> Sending packet 2 (37 bytes) for connection b29474bca96bd3b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 81.982µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:36 client <- Reading packet 3 (1400 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.PingFrame{} 2025/04/30 09:12:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:36 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:36 client -> Sending packet 3 (38 bytes) for connection b29474bca96bd3b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.244708ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:36 client -> Sending packet 5 (48 bytes) for connection b29474bca96bd3b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:36 client -> Sending packet 6 (48 bytes) for connection b29474bca96bd3b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:36 client <- Reading packet 4 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:36 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 120µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:36 client newly acked packets (1): [6] 2025/04/30 09:12:36 client updated RTT: 32.816ms (σ: 12.668ms) 2025/04/30 09:12:36 client ECN capability confirmed. 2025/04/30 09:12:36 client Canceling loss detection timer. 2025/04/30 09:12:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 521dbe8bfaad4d5c, StatelessResetToken: 0xb42e99a62a2cc3eb7716b9023fa70b0a} 2025/04/30 09:12:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:36 client -> Sending packet 7 (30 bytes) for connection b29474bca96bd3b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:36 client Short Header{DestConnectionID: e9422f84a2fad50c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:36 client Connection b29474bca96bd3b5 closed. 2025/04/30 09:12:36 Requesting https://server4:443/yhwsahzkah. 2025/04/30 09:12:36 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:36 Increased send buffer size to 14336 kiB 2025/04/30 09:12:36 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:36 Created qlog file: /logs/qlog/fc14bc6a1da90491365598886321c377.sqlog 2025/04/30 09:12:36 client Starting new connection to server4 ([::]:45889 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc14bc6a1da90491365598886321c377, version v1 2025/04/30 09:12:36 Adding connection ID (empty). 2025/04/30 09:12:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:36 client -> Sending packet 0 (1280 bytes) for connection fc14bc6a1da90491365598886321c377, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: fc14bc6a1da90491365598886321c377, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:36 client -> Sending packet 1 (1280 bytes) for connection fc14bc6a1da90491365598886321c377, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: fc14bc6a1da90491365598886321c377, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:36 client -> Sending packet 2 (1280 bytes) for connection fc14bc6a1da90491365598886321c377, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: fc14bc6a1da90491365598886321c377, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:36 client -> Sending packet 3 (1280 bytes) for connection fc14bc6a1da90491365598886321c377, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: fc14bc6a1da90491365598886321c377, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:36 client -> Sending packet 4 (1280 bytes) for connection fc14bc6a1da90491365598886321c377, Initial 2025/04/30 09:12:36 client Long Header{Type: Initial, DestConnectionID: fc14bc6a1da90491365598886321c377, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:37 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:37 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:37 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:37 client <- Reading packet 90952 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8fdac7f4b72924b3, Token: (empty), PacketNumber: 90952, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:37 client Received first packet. Switching destination connection ID to: 8fdac7f4b72924b3 2025/04/30 09:12:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 48µs} 2025/04/30 09:12:37 client newly acked packets (1): [4] 2025/04/30 09:12:37 client updated RTT: 35.553371ms (σ: 17.776685ms) 2025/04/30 09:12:37 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:37 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fdac7f4b72924b3, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:37 client <- &wire.PingFrame{} 2025/04/30 09:12:37 client -> Sending packet 5 (1280 bytes) for connection fc14bc6a1da90491365598886321c377, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: 8fdac7f4b72924b3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 90952, LowestAcked: 90952, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:37 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:37 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:37 client -> Sending packet 0 (43 bytes) for connection fc14bc6a1da90491365598886321c377, Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: 8fdac7f4b72924b3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:37 client Dropping Initial keys. 2025/04/30 09:12:37 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:37 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fdac7f4b72924b3, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:12:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc14bc6a1da90491365598886321c377, InitialSourceConnectionID: 8fdac7f4b72924b3, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xc6502b91a931dc5b425b734bfde4ee0e} 2025/04/30 09:12:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.576ms} 2025/04/30 09:12:37 client Peer doesn't await address validation any longer. 2025/04/30 09:12:37 client Canceling loss detection timer. 2025/04/30 09:12:37 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:37 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fdac7f4b72924b3, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:37 client <- &wire.PingFrame{} 2025/04/30 09:12:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.576ms} 2025/04/30 09:12:37 client -> Sending packet 1 (82 bytes) for connection fc14bc6a1da90491365598886321c377, Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: 8fdac7f4b72924b3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:37 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.NewTokenFrame{Token: 0xfa46c1bdc537eeedd6cb6671eaf4530256e548f901b456243241b02d2d2739e85a9b9d1a46c5313c4b3f82bd5c2a24617414} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 654ec6343c569203, StatelessResetToken: 0x7c7958582de924b39f1286ebb6e96fcd} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c2d3f458d099e76, StatelessResetToken: 0x2baec0c754a3bc09f664542b54208701} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4e5afcbc7431689c, StatelessResetToken: 0x5c2caaabc97d0bef462108fc9d0ca7fa} 2025/04/30 09:12:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:37 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.PingFrame{} 2025/04/30 09:12:37 client -> Sending packet 0 (57 bytes) for connection fc14bc6a1da90491365598886321c377, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: 654ec6343c569203, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64.946741ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:37 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:37 client newly acked packets (1): [0] 2025/04/30 09:12:37 client updated RTT: 35.078ms (σ: 14.281ms) 2025/04/30 09:12:37 client ECN capability confirmed. 2025/04/30 09:12:37 client Canceling loss detection timer. 2025/04/30 09:12:37 client Dropping Handshake keys. 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 864fe7410916f5e3, StatelessResetToken: 0x0376bd6032a777b22d390453be0728dc} 2025/04/30 09:12:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:37 client Ignoring all packets below 2. 2025/04/30 09:12:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:37 client -> Sending packet 1 (30 bytes) for connection fc14bc6a1da90491365598886321c377, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: 654ec6343c569203, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:37 client Connection fc14bc6a1da90491365598886321c377 closed. 2025/04/30 09:12:37 Requesting https://server4:443/ayoesituxx. 2025/04/30 09:12:37 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:37 Increased send buffer size to 14336 kiB 2025/04/30 09:12:37 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:37 Created qlog file: /logs/qlog/c746c6cd99eb78bfd471.sqlog 2025/04/30 09:12:37 client Starting new connection to server4 ([::]:56410 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c746c6cd99eb78bfd471, version v1 2025/04/30 09:12:37 Adding connection ID (empty). 2025/04/30 09:12:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:37 client -> Sending packet 0 (1280 bytes) for connection c746c6cd99eb78bfd471, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: c746c6cd99eb78bfd471, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:37 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:37 client -> Sending packet 1 (1280 bytes) for connection c746c6cd99eb78bfd471, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: c746c6cd99eb78bfd471, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:37 client -> Sending packet 2 (1280 bytes) for connection c746c6cd99eb78bfd471, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: c746c6cd99eb78bfd471, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:37 client -> Sending packet 3 (1280 bytes) for connection c746c6cd99eb78bfd471, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: c746c6cd99eb78bfd471, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:37 client -> Sending packet 4 (1280 bytes) for connection c746c6cd99eb78bfd471, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: c746c6cd99eb78bfd471, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 09:12:37 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:37 client <- Reading packet 104951 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 03634f840bb2a209, Token: (empty), PacketNumber: 104951, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:37 client Received first packet. Switching destination connection ID to: 03634f840bb2a209 2025/04/30 09:12:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 09:12:37 client newly acked packets (1): [4] 2025/04/30 09:12:37 client updated RTT: 33.829346ms (σ: 16.914673ms) 2025/04/30 09:12:37 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:37 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 03634f840bb2a209, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:12:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c746c6cd99eb78bfd471, InitialSourceConnectionID: 03634f840bb2a209, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2755b89846e05677329db3737647c06e} 2025/04/30 09:12:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c746c6cd99eb78bfd471 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: 03634f840bb2a209, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 104951, LowestAcked: 104951, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: 03634f840bb2a209, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:37 client Dropping Initial keys. 2025/04/30 09:12:37 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.NewTokenFrame{Token: 0xcd7d69201282af7a37dbc8f79aa5a624fe9531085433a293037bee23b61fb2565e7c01457022a8ac189546fd22c13e40cf4d} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cedc67eeee0e89d0, StatelessResetToken: 0xbc9335494a5ee8a4fe3564c5ba79de3c} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c516538ac891e871, StatelessResetToken: 0xb96f31ce904a5d4d67768322c8e5d36b} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb156e87aa32bc2e, StatelessResetToken: 0x0234a0c854836e4a319c5b2054b81f82} 2025/04/30 09:12:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:37 client -> Sending packet 1 (91 bytes) for connection c746c6cd99eb78bfd471, Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: cedc67eeee0e89d0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:37 client -> Sending packet 1 (38 bytes) for connection c746c6cd99eb78bfd471, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 602.794928ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:37 client <- Reading packet 3 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 03634f840bb2a209, PacketNumber: 3, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:37 client <- &wire.PingFrame{} 2025/04/30 09:12:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80µs} 2025/04/30 09:12:37 client Peer doesn't await address validation any longer. 2025/04/30 09:12:37 client -> Sending packet 2 (43 bytes) for connection c746c6cd99eb78bfd471, Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: cedc67eeee0e89d0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:37 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:37 client -> Sending packet 3 (74 bytes) for connection c746c6cd99eb78bfd471, Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: cedc67eeee0e89d0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:37 client -> Sending packet 4 (74 bytes) for connection c746c6cd99eb78bfd471, Handshake 2025/04/30 09:12:37 client Long Header{Type: Handshake, DestConnectionID: cedc67eeee0e89d0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:37 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:37 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:37 client Dropping Handshake keys. 2025/04/30 09:12:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:37 client -> Sending packet 3 (58 bytes) for connection c746c6cd99eb78bfd471, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 73.306µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:37 client -> Sending packet 4 (48 bytes) for connection c746c6cd99eb78bfd471, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:37 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.PingFrame{} 2025/04/30 09:12:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:37 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:37 client -> Sending packet 5 (38 bytes) for connection c746c6cd99eb78bfd471, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.233395ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:37 client <- Reading packet 6 (1400 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.PingFrame{} 2025/04/30 09:12:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:37 client -> Sending packet 6 (39 bytes) for connection c746c6cd99eb78bfd471, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 70.662µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:37 client <- Reading packet 7 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:37 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6cc693f9e4f0ec1a, StatelessResetToken: 0x560c1befcb8eb6f0434aa80e3bac06b5} 2025/04/30 09:12:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:37 client -> Sending packet 7 (30 bytes) for connection c746c6cd99eb78bfd471, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:37 client Short Header{DestConnectionID: cedc67eeee0e89d0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:37 client Connection c746c6cd99eb78bfd471 closed. 2025/04/30 09:12:37 Requesting https://server4:443/wliyrsgokr. 2025/04/30 09:12:37 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:37 Increased send buffer size to 14336 kiB 2025/04/30 09:12:37 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:37 Created qlog file: /logs/qlog/12348cfceed75e3cd2c7.sqlog 2025/04/30 09:12:37 client Starting new connection to server4 ([::]:58657 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 12348cfceed75e3cd2c7, version v1 2025/04/30 09:12:37 Adding connection ID (empty). 2025/04/30 09:12:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:37 client -> Sending packet 0 (1280 bytes) for connection 12348cfceed75e3cd2c7, Initial 2025/04/30 09:12:37 client Long Header{Type: Initial, DestConnectionID: 12348cfceed75e3cd2c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:12:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:38 client -> Sending packet 1 (1280 bytes) for connection 12348cfceed75e3cd2c7, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: 12348cfceed75e3cd2c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:12:38 client -> Sending packet 2 (1280 bytes) for connection 12348cfceed75e3cd2c7, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: 12348cfceed75e3cd2c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:12:38 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:38 client <- Reading packet 111208 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57085bf5609f3de8, Token: (empty), PacketNumber: 111208, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:38 client Received first packet. Switching destination connection ID to: 57085bf5609f3de8 2025/04/30 09:12:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 48µs} 2025/04/30 09:12:38 client newly acked packets (1): [2] 2025/04/30 09:12:38 client updated RTT: 35.604695ms (σ: 17.802347ms) 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:38 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57085bf5609f3de8, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client -> Sending packet 3 (1280 bytes) for connection 12348cfceed75e3cd2c7, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: 57085bf5609f3de8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 111208, LowestAcked: 111208, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:38 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:38 client -> Sending packet 0 (43 bytes) for connection 12348cfceed75e3cd2c7, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: 57085bf5609f3de8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:38 client Dropping Initial keys. 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:38 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57085bf5609f3de8, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 12348cfceed75e3cd2c7, InitialSourceConnectionID: 57085bf5609f3de8, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x0b0f8b820230d07fb192d9c29333269a} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.544ms} 2025/04/30 09:12:38 client Peer doesn't await address validation any longer. 2025/04/30 09:12:38 client Canceling loss detection timer. 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:38 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57085bf5609f3de8, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.544ms} 2025/04/30 09:12:38 client -> Sending packet 1 (82 bytes) for connection 12348cfceed75e3cd2c7, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: 57085bf5609f3de8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:38 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:38 client <- &wire.NewTokenFrame{Token: 0xf60be74cf357afc574b7f0a478e5793501cd7ed4529ef41a02d7f990d0eb9279b233e06e1efa3877067a8d0c42df9c732ac0} 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1de051a840130a9e, StatelessResetToken: 0x858dd43705f82210d81713ca39c773c2} 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 015ed021d0f3f974, StatelessResetToken: 0xc6042670b0808c9daa35471001789f4a} 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d3142ea4d7f7353, StatelessResetToken: 0xf82a3abd5ca38dcf0ab8d4f4022ff385} 2025/04/30 09:12:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:38 client -> Sending packet 0 (57 bytes) for connection 12348cfceed75e3cd2c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 1de051a840130a9e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 65.877756ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:38 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:38 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:38 client Dropping Handshake keys. 2025/04/30 09:12:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:38 client -> Sending packet 1 (37 bytes) for connection 12348cfceed75e3cd2c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 1de051a840130a9e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 92.513µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:38 client <- Reading packet 3 (1400 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:38 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:38 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:38 client -> Sending packet 2 (38 bytes) for connection 12348cfceed75e3cd2c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 1de051a840130a9e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.278738ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:38 client -> Sending packet 4 (48 bytes) for connection 12348cfceed75e3cd2c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 1de051a840130a9e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:38 client -> Sending packet 5 (48 bytes) for connection 12348cfceed75e3cd2c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 1de051a840130a9e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:38 client <- Reading packet 4 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 32µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:12:38 client newly acked packets (1): [5] 2025/04/30 09:12:38 client updated RTT: 35.13ms (σ: 14.298ms) 2025/04/30 09:12:38 client ECN capability confirmed. 2025/04/30 09:12:38 client Canceling loss detection timer. 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 39f830d260775b6e, StatelessResetToken: 0x52d4a42bc70cd57a000033cd363c71cd} 2025/04/30 09:12:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:38 client -> Sending packet 6 (30 bytes) for connection 12348cfceed75e3cd2c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 1de051a840130a9e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:38 client Connection 12348cfceed75e3cd2c7 closed. 2025/04/30 09:12:38 Requesting https://server4:443/pztyfnylor. 2025/04/30 09:12:38 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:38 Increased send buffer size to 14336 kiB 2025/04/30 09:12:38 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:38 Created qlog file: /logs/qlog/71a2b6c9a51db030c8ff2ed1.sqlog 2025/04/30 09:12:38 client Starting new connection to server4 ([::]:37538 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 71a2b6c9a51db030c8ff2ed1, version v1 2025/04/30 09:12:38 Adding connection ID (empty). 2025/04/30 09:12:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:38 client -> Sending packet 0 (1280 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: 71a2b6c9a51db030c8ff2ed1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:38 client -> Sending packet 1 (1280 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: 71a2b6c9a51db030c8ff2ed1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:38 client -> Sending packet 2 (1280 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: 71a2b6c9a51db030c8ff2ed1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:38 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:38 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:38 client <- Reading packet 101419 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d81d0ed12cbf0fbc, Token: (empty), PacketNumber: 101419, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:38 client Received first packet. Switching destination connection ID to: d81d0ed12cbf0fbc 2025/04/30 09:12:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 40µs} 2025/04/30 09:12:38 client newly acked packets (1): [2] 2025/04/30 09:12:38 client updated RTT: 35.538345ms (σ: 17.769172ms) 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:38 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d81d0ed12cbf0fbc, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client -> Sending packet 3 (1280 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Initial 2025/04/30 09:12:38 client Long Header{Type: Initial, DestConnectionID: d81d0ed12cbf0fbc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 101419, LowestAcked: 101419, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:38 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:38 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:38 client -> Sending packet 0 (43 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: d81d0ed12cbf0fbc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:38 client Dropping Initial keys. 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:38 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d81d0ed12cbf0fbc, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 09:12:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 71a2b6c9a51db030c8ff2ed1, InitialSourceConnectionID: d81d0ed12cbf0fbc, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1a85cf249eaa5bdc7649049c8f3f8b51} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.568ms} 2025/04/30 09:12:38 client Peer doesn't await address validation any longer. 2025/04/30 09:12:38 client Canceling loss detection timer. 2025/04/30 09:12:38 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:38 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d81d0ed12cbf0fbc, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.568ms} 2025/04/30 09:12:38 client -> Sending packet 1 (82 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: d81d0ed12cbf0fbc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:38 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:38 client <- &wire.NewTokenFrame{Token: 0x968a5110b2d7f1acc3cae44dc80fff73ccc29a4a4b0e3f53c3ca227c8c72c6ed2b8c616b9026bb6d890b2d012bad1fa5e9a8} 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41835741ab86c47b, StatelessResetToken: 0x52b012e406e659cb0c1085df82c9907b} 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fc53fa9e044db5f5, StatelessResetToken: 0x158233e90714f0919d25c5f9067a77d8} 2025/04/30 09:12:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ebab34e4f2abdb1, StatelessResetToken: 0x644f5135f2324489e7dd3ad516175aaf} 2025/04/30 09:12:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:38 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:38 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client -> Sending packet 0 (57 bytes) for connection 71a2b6c9a51db030c8ff2ed1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:38 client Short Header{DestConnectionID: 41835741ab86c47b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64.793754ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:38 client <- Reading packet 5 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d81d0ed12cbf0fbc, PacketNumber: 5, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 130.576ms} 2025/04/30 09:12:38 client -> Sending packet 2 (43 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: 41835741ab86c47b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:38 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:38 client -> Sending packet 3 (74 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: 41835741ab86c47b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:38 client -> Sending packet 4 (74 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: 41835741ab86c47b, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:38 client <- Reading packet 6 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d81d0ed12cbf0fbc, PacketNumber: 6, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:38 client <- &wire.PingFrame{} 2025/04/30 09:12:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 330.648ms} 2025/04/30 09:12:38 client -> Sending packet 5 (43 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:38 client Long Header{Type: Handshake, DestConnectionID: 41835741ab86c47b, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:38 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:12:39 client -> Sending packet 6 (74 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 41835741ab86c47b, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:39 client -> Sending packet 7 (74 bytes) for connection 71a2b6c9a51db030c8ff2ed1, Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 41835741ab86c47b, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:39 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.NewTokenFrame{Token: 0x968a5110b2d7f1acc3cae44dc80fff73ccc29a4a4b0e3f53c3ca227c8c72c6ed2b8c616b9026bb6d890b2d012bad1fa5e9a8} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41835741ab86c47b, StatelessResetToken: 0x52b012e406e659cb0c1085df82c9907b} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fc53fa9e044db5f5, StatelessResetToken: 0x158233e90714f0919d25c5f9067a77d8} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ebab34e4f2abdb1, StatelessResetToken: 0x644f5135f2324489e7dd3ad516175aaf} 2025/04/30 09:12:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:39 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:39 client Dropping Handshake keys. 2025/04/30 09:12:39 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:39 client -> Sending packet 2 (56 bytes) for connection 71a2b6c9a51db030c8ff2ed1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: 41835741ab86c47b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 84.809µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:39 client -> Sending packet 3 (48 bytes) for connection 71a2b6c9a51db030c8ff2ed1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: 41835741ab86c47b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:39 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.PingFrame{} 2025/04/30 09:12:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:39 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:39 client -> Sending packet 4 (36 bytes) for connection 71a2b6c9a51db030c8ff2ed1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: 41835741ab86c47b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 25.218936ms, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:39 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: efee7f9c66f85693, StatelessResetToken: 0xf69a255a57f1ef4b355e2e4e96ce239d} 2025/04/30 09:12:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:39 client -> Sending packet 5 (30 bytes) for connection 71a2b6c9a51db030c8ff2ed1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: 41835741ab86c47b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:39 client Connection 71a2b6c9a51db030c8ff2ed1 closed. 2025/04/30 09:12:39 Requesting https://server4:443/bafdwqatpb. 2025/04/30 09:12:39 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:39 Increased send buffer size to 14336 kiB 2025/04/30 09:12:39 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:39 Created qlog file: /logs/qlog/7954cca87351802d20e1536db6586b89.sqlog 2025/04/30 09:12:39 client Starting new connection to server4 ([::]:46213 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7954cca87351802d20e1536db6586b89, version v1 2025/04/30 09:12:39 Adding connection ID (empty). 2025/04/30 09:12:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:39 client -> Sending packet 0 (1280 bytes) for connection 7954cca87351802d20e1536db6586b89, Initial 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: 7954cca87351802d20e1536db6586b89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:12:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:39 client -> Sending packet 1 (1280 bytes) for connection 7954cca87351802d20e1536db6586b89, Initial 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: 7954cca87351802d20e1536db6586b89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:12:39 client -> Sending packet 2 (1280 bytes) for connection 7954cca87351802d20e1536db6586b89, Initial 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: 7954cca87351802d20e1536db6586b89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:12:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:39 client -> Sending packet 3 (1280 bytes) for connection 7954cca87351802d20e1536db6586b89, Initial 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: 7954cca87351802d20e1536db6586b89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:12:39 client -> Sending packet 4 (1280 bytes) for connection 7954cca87351802d20e1536db6586b89, Initial 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: 7954cca87351802d20e1536db6586b89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 09:12:39 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:12:39 client <- Reading packet 127954 (138 bytes) for connection (empty), Initial 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12231abdc3ba15d2, Token: (empty), PacketNumber: 127954, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:12:39 client Received first packet. Switching destination connection ID to: 12231abdc3ba15d2 2025/04/30 09:12:39 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 616µs} 2025/04/30 09:12:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:39 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 363 bytes. 2025/04/30 09:12:39 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12231abdc3ba15d2, PacketNumber: 0, PacketNumberLen: 4, Length: 734, Version: v1} 2025/04/30 09:12:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:12:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7954cca87351802d20e1536db6586b89, InitialSourceConnectionID: 12231abdc3ba15d2, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x313cf7893aeeded58f9835772f26d150} 2025/04/30 09:12:39 client Parsed a coalesced packet. Part 3: 363 bytes. Remaining: 0 bytes. 2025/04/30 09:12:39 client <- Reading packet 1 (363 bytes) for connection (empty), Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12231abdc3ba15d2, PacketNumber: 1, PacketNumberLen: 4, Length: 346, Version: v1} 2025/04/30 09:12:39 client <- &wire.PingFrame{} 2025/04/30 09:12:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7954cca87351802d20e1536db6586b89 2025/04/30 09:12:39 client Long Header{Type: Initial, DestConnectionID: 12231abdc3ba15d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1142, Version: v1} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 127954, LowestAcked: 127954, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 12231abdc3ba15d2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:39 client Short Header{DestConnectionID: 12231abdc3ba15d2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:39 client Dropping Initial keys. 2025/04/30 09:12:39 client -> Sending packet 1 (43 bytes) for connection 7954cca87351802d20e1536db6586b89, Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 12231abdc3ba15d2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:39 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.PingFrame{} 2025/04/30 09:12:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:39 client -> Sending packet 1 (35 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: 12231abdc3ba15d2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 51.105µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:39 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:39 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:12:39 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:39 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12231abdc3ba15d2, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:39 client <- &wire.PingFrame{} 2025/04/30 09:12:39 client -> Sending packet 2 (43 bytes) for connection 7954cca87351802d20e1536db6586b89, Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 12231abdc3ba15d2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:39 client -> Sending packet 3 (74 bytes) for connection 7954cca87351802d20e1536db6586b89, Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 12231abdc3ba15d2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:39 client -> Sending packet 4 (74 bytes) for connection 7954cca87351802d20e1536db6586b89, Handshake 2025/04/30 09:12:39 client Long Header{Type: Handshake, DestConnectionID: 12231abdc3ba15d2, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:39 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.NewTokenFrame{Token: 0xb1fdc5ebfb9ce1d2d7960ab66b2daf96a38da81796e6c5968815110d86bdcab645e7f518673ff4f61a093e76509b51d82f52} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b62dcbac05de1448, StatelessResetToken: 0xaa43a4aa66b29bf5b8b678f7844df035} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 541de517bc9b87d1, StatelessResetToken: 0x675108c11911572b12fe0308fc7a0ea3} 2025/04/30 09:12:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 585fd80b197d1861, StatelessResetToken: 0x1f3771f6f082d5df8cb6d7757c165222} 2025/04/30 09:12:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:39 client -> Sending packet 2 (37 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 92.223µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:39 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:39 client Dropping Handshake keys. 2025/04/30 09:12:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:39 client -> Sending packet 3 (1360 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.PingFrame{} 2025/04/30 09:12:39 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:39 client -> Sending packet 4 (36 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:39 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.397555ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:40 client -> Sending packet 6 (46 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:40 client Skipping packet number 5 2025/04/30 09:12:40 client -> Sending packet 7 (29 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:40 client <- Reading packet 5 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.NewTokenFrame{Token: 0xb1fdc5ebfb9ce1d2d7960ab66b2daf96a38da81796e6c5968815110d86bdcab645e7f518673ff4f61a093e76509b51d82f52} 2025/04/30 09:12:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b62dcbac05de1448, StatelessResetToken: 0xaa43a4aa66b29bf5b8b678f7844df035} 2025/04/30 09:12:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 541de517bc9b87d1, StatelessResetToken: 0x675108c11911572b12fe0308fc7a0ea3} 2025/04/30 09:12:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 585fd80b197d1861, StatelessResetToken: 0x1f3771f6f082d5df8cb6d7757c165222} 2025/04/30 09:12:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:40 client -> Sending packet 8 (37 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 74.539µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:40 client <- Reading packet 6 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.PingFrame{} 2025/04/30 09:12:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:40 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 120µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:40 client newly acked packets (1): [6] 2025/04/30 09:12:40 client updated RTT: 30.912831ms (σ: 15.456415ms) 2025/04/30 09:12:40 client ECN capability confirmed. 2025/04/30 09:12:40 client lost packet 3 (time threshold) 2025/04/30 09:12:40 client -> Sending packet 9 (1320 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.PingFrame{} 2025/04/30 09:12:40 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:40 client -> Sending packet 10 (38 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 15.347555ms, ECT0: 0, ECT1: 6, CE: 0} 2025/04/30 09:12:40 client <- Reading packet 10 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:40 client newly acked packets (1): [9] 2025/04/30 09:12:40 client updated RTT: 31.001ms (σ: 11.77ms) 2025/04/30 09:12:40 client lost packet 7 (time threshold) 2025/04/30 09:12:40 client Canceling loss detection timer. 2025/04/30 09:12:40 client -> Sending packet 11 (29 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:40 client <- Reading packet 11 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:40 client -> Sending packet 12 (30 bytes) for connection 7954cca87351802d20e1536db6586b89, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: b62dcbac05de1448, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:40 client Connection 7954cca87351802d20e1536db6586b89 closed. 2025/04/30 09:12:40 Requesting https://server4:443/qzqqhxonsr. 2025/04/30 09:12:40 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:40 Increased send buffer size to 14336 kiB 2025/04/30 09:12:40 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:40 Created qlog file: /logs/qlog/ad7014be398a296b18.sqlog 2025/04/30 09:12:40 client Starting new connection to server4 ([::]:58046 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ad7014be398a296b18, version v1 2025/04/30 09:12:40 Adding connection ID (empty). 2025/04/30 09:12:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:40 client -> Sending packet 0 (1280 bytes) for connection ad7014be398a296b18, Initial 2025/04/30 09:12:40 client Long Header{Type: Initial, DestConnectionID: ad7014be398a296b18, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:12:40 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:40 client -> Sending packet 1 (1280 bytes) for connection ad7014be398a296b18, Initial 2025/04/30 09:12:40 client Long Header{Type: Initial, DestConnectionID: ad7014be398a296b18, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:12:40 client -> Sending packet 2 (1280 bytes) for connection ad7014be398a296b18, Initial 2025/04/30 09:12:40 client Long Header{Type: Initial, DestConnectionID: ad7014be398a296b18, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:12:40 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:40 client <- Reading packet 87941 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bf26881df5956442, Token: (empty), PacketNumber: 87941, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:40 client Received first packet. Switching destination connection ID to: bf26881df5956442 2025/04/30 09:12:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs} 2025/04/30 09:12:40 client newly acked packets (1): [2] 2025/04/30 09:12:40 client updated RTT: 33.700814ms (σ: 16.850407ms) 2025/04/30 09:12:40 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:40 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bf26881df5956442, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:40 client <- &wire.PingFrame{} 2025/04/30 09:12:40 client -> Sending packet 3 (1280 bytes) for connection ad7014be398a296b18, Initial 2025/04/30 09:12:40 client Long Header{Type: Initial, DestConnectionID: bf26881df5956442, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 87941, LowestAcked: 87941, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:40 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:40 client -> Sending packet 0 (43 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: bf26881df5956442, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:40 client Dropping Initial keys. 2025/04/30 09:12:40 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:40 client <- Reading packet 3 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bf26881df5956442, PacketNumber: 3, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ad7014be398a296b18, InitialSourceConnectionID: bf26881df5956442, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xb59f7e534f0f826fd5d3eb1c1c741fd2} 2025/04/30 09:12:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 09:12:40 client Peer doesn't await address validation any longer. 2025/04/30 09:12:40 client Canceling loss detection timer. 2025/04/30 09:12:40 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:40 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bf26881df5956442, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:40 client <- &wire.PingFrame{} 2025/04/30 09:12:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 09:12:40 client -> Sending packet 1 (82 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: bf26881df5956442, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:40 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.NewTokenFrame{Token: 0x9e01dfb906f2e459c8dfd1e234bad8aa79f1c0edd33eb0f5fcd68c6ab6d2296e3bfa8e913cbf375cb1b125b9dcc382987dc8} 2025/04/30 09:12:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1a6e0411d8a35d1a, StatelessResetToken: 0x3920ba00650060e081b11aa3e8e64072} 2025/04/30 09:12:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 834c58897f04868c, StatelessResetToken: 0xa7dfab359670e00150077f6b2ca0bf23} 2025/04/30 09:12:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b3dcb1b76e8f7f6d, StatelessResetToken: 0x98dd9387f52763449d0d5de246d2e843} 2025/04/30 09:12:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:40 client -> Sending packet 0 (40 bytes) for connection ad7014be398a296b18, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: 1a6e0411d8a35d1a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 234.508374ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:40 client -> Sending packet 1 (46 bytes) for connection ad7014be398a296b18, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: 1a6e0411d8a35d1a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:40 client <- Reading packet 5 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bf26881df5956442, PacketNumber: 5, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96.392ms} 2025/04/30 09:12:40 client -> Sending packet 2 (43 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: 1a6e0411d8a35d1a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:40 client -> Sending packet 3 (74 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: 1a6e0411d8a35d1a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:40 client -> Sending packet 4 (74 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: 1a6e0411d8a35d1a, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:40 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:40 client <- &wire.PingFrame{} 2025/04/30 09:12:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:40 client -> Sending packet 2 (37 bytes) for connection ad7014be398a296b18, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:40 client Short Header{DestConnectionID: 1a6e0411d8a35d1a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 66.024µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:40 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:12:40 client -> Sending packet 5 (74 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: 1a6e0411d8a35d1a, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:40 client -> Sending packet 6 (74 bytes) for connection ad7014be398a296b18, Handshake 2025/04/30 09:12:40 client Long Header{Type: Handshake, DestConnectionID: 1a6e0411d8a35d1a, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:41 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:41 client Dropping Handshake keys. 2025/04/30 09:12:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:41 client -> Sending packet 4 (41 bytes) for connection ad7014be398a296b18, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: 1a6e0411d8a35d1a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 84.738µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:41 client Skipping packet number 3 2025/04/30 09:12:41 client -> Sending packet 5 (46 bytes) for connection ad7014be398a296b18, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: 1a6e0411d8a35d1a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:41 client <- Reading packet 8 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:41 client newly acked packets (2): [4 5] 2025/04/30 09:12:41 client updated RTT: 33.473ms (σ: 13.091ms) 2025/04/30 09:12:41 client ECN capability confirmed. 2025/04/30 09:12:41 client Canceling loss detection timer. 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 14282bf4d12236fc, StatelessResetToken: 0x570c0553287e11188b0c64eab7273583} 2025/04/30 09:12:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:41 client Ignoring all packets below 8. 2025/04/30 09:12:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:41 client -> Sending packet 6 (30 bytes) for connection ad7014be398a296b18, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: 1a6e0411d8a35d1a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:41 client Connection ad7014be398a296b18 closed. 2025/04/30 09:12:41 Requesting https://server4:443/kvaltlpaif. 2025/04/30 09:12:41 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:41 Increased send buffer size to 14336 kiB 2025/04/30 09:12:41 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:41 Created qlog file: /logs/qlog/17750fd5ed83a490cf37ac15b2f82a.sqlog 2025/04/30 09:12:41 client Starting new connection to server4 ([::]:40706 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 17750fd5ed83a490cf37ac15b2f82a, version v1 2025/04/30 09:12:41 Adding connection ID (empty). 2025/04/30 09:12:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:41 client -> Sending packet 0 (1280 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: 17750fd5ed83a490cf37ac15b2f82a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:41 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:41 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:41 client -> Sending packet 1 (1280 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: 17750fd5ed83a490cf37ac15b2f82a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:41 client -> Sending packet 2 (1280 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: 17750fd5ed83a490cf37ac15b2f82a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:41 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:41 client <- Reading packet 119366 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a10973e2fbc2af9d, Token: (empty), PacketNumber: 119366, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:41 client Received first packet. Switching destination connection ID to: a10973e2fbc2af9d 2025/04/30 09:12:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 32µs} 2025/04/30 09:12:41 client newly acked packets (1): [2] 2025/04/30 09:12:41 client updated RTT: 33.707278ms (σ: 16.853639ms) 2025/04/30 09:12:41 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:41 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a10973e2fbc2af9d, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client -> Sending packet 3 (1280 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: a10973e2fbc2af9d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 119366, LowestAcked: 119366, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:41 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:41 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:41 client -> Sending packet 0 (43 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: a10973e2fbc2af9d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:41 client Dropping Initial keys. 2025/04/30 09:12:41 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:41 client <- Reading packet 4 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a10973e2fbc2af9d, PacketNumber: 4, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:12:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 17750fd5ed83a490cf37ac15b2f82a, InitialSourceConnectionID: a10973e2fbc2af9d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xfd6249c2367fc8dc62be4b06b45ba154} 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:41 client Peer doesn't await address validation any longer. 2025/04/30 09:12:41 client Canceling loss detection timer. 2025/04/30 09:12:41 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:41 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a10973e2fbc2af9d, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:41 client -> Sending packet 1 (82 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: a10973e2fbc2af9d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:41 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.NewTokenFrame{Token: 0xb458537140a352d1593203a10672dc00641b4e9f945f225e622ee5812fd32bac41e6499d7eb0e794441b22b473f50cdfc014} 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b23b13aba2c0b656, StatelessResetToken: 0x3d90c954ceb7ad3acc7fbb93f70df732} 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 728d7cd29d8a8526, StatelessResetToken: 0xfdb7f632078d8a6f0624922df9136434} 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 89c725a3bca3bdf0, StatelessResetToken: 0xb048bd38ec2aa073124f78d3a72f49d2} 2025/04/30 09:12:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:41 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client -> Sending packet 0 (59 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: b23b13aba2c0b656, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 233.421823ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:41 client <- Reading packet 6 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a10973e2fbc2af9d, PacketNumber: 6, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 30.056ms} 2025/04/30 09:12:41 client -> Sending packet 2 (43 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: b23b13aba2c0b656, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:41 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.NewTokenFrame{Token: 0xb458537140a352d1593203a10672dc00641b4e9f945f225e622ee5812fd32bac41e6499d7eb0e794441b22b473f50cdfc014} 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b23b13aba2c0b656, StatelessResetToken: 0x3d90c954ceb7ad3acc7fbb93f70df732} 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 728d7cd29d8a8526, StatelessResetToken: 0xfdb7f632078d8a6f0624922df9136434} 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 89c725a3bca3bdf0, StatelessResetToken: 0xb048bd38ec2aa073124f78d3a72f49d2} 2025/04/30 09:12:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:41 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:41 client Dropping Handshake keys. 2025/04/30 09:12:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:41 client -> Sending packet 1 (35 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: b23b13aba2c0b656, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 129.471µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:41 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:41 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:41 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.608ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:41 client newly acked packets (1): [0] 2025/04/30 09:12:41 client updated RTT: 33.928ms (σ: 13.082ms) 2025/04/30 09:12:41 client ECN capability confirmed. 2025/04/30 09:12:41 client Canceling loss detection timer. 2025/04/30 09:12:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 767bcbca7ecc57ea, StatelessResetToken: 0xc892ffb0bc48bf58faaf96f5d3f07191} 2025/04/30 09:12:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:41 client Ignoring all packets below 2. 2025/04/30 09:12:41 client -> Sending packet 2 (35 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: b23b13aba2c0b656, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 121.797µs, ECT0: 0, ECT1: 6, CE: 0} 2025/04/30 09:12:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:41 client -> Sending packet 3 (30 bytes) for connection 17750fd5ed83a490cf37ac15b2f82a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 client Short Header{DestConnectionID: b23b13aba2c0b656, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:41 client Connection 17750fd5ed83a490cf37ac15b2f82a closed. 2025/04/30 09:12:41 Requesting https://server4:443/gdsskztnmj. 2025/04/30 09:12:41 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:41 Increased send buffer size to 14336 kiB 2025/04/30 09:12:41 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:41 Created qlog file: /logs/qlog/d3ae2e4cc790522f1de2d27c.sqlog 2025/04/30 09:12:41 client Starting new connection to server4 ([::]:41404 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d3ae2e4cc790522f1de2d27c, version v1 2025/04/30 09:12:41 Adding connection ID (empty). 2025/04/30 09:12:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:41 client -> Sending packet 0 (1280 bytes) for connection d3ae2e4cc790522f1de2d27c, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: d3ae2e4cc790522f1de2d27c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:41 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:41 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:41 client -> Sending packet 1 (1280 bytes) for connection d3ae2e4cc790522f1de2d27c, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: d3ae2e4cc790522f1de2d27c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:41 client -> Sending packet 2 (1280 bytes) for connection d3ae2e4cc790522f1de2d27c, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: d3ae2e4cc790522f1de2d27c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:41 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:41 client <- Reading packet 107004 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0a8fe7f7863620c1, Token: (empty), PacketNumber: 107004, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:41 client Received first packet. Switching destination connection ID to: 0a8fe7f7863620c1 2025/04/30 09:12:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 250.112ms} 2025/04/30 09:12:41 client newly acked packets (1): [2] 2025/04/30 09:12:41 client updated RTT: 283.84488ms (σ: 141.92244ms) 2025/04/30 09:12:41 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:41 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a8fe7f7863620c1, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client -> Sending packet 3 (1280 bytes) for connection d3ae2e4cc790522f1de2d27c, Initial 2025/04/30 09:12:41 client Long Header{Type: Initial, DestConnectionID: 0a8fe7f7863620c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 107004, LowestAcked: 107004, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:41 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:41 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:41 client -> Sending packet 0 (43 bytes) for connection d3ae2e4cc790522f1de2d27c, Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: 0a8fe7f7863620c1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:41 client Dropping Initial keys. 2025/04/30 09:12:41 client <- Reading packet 6 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a8fe7f7863620c1, PacketNumber: 6, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:41 client <- &wire.PingFrame{} 2025/04/30 09:12:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 32µs} 2025/04/30 09:12:41 client Peer doesn't await address validation any longer. 2025/04/30 09:12:41 client Canceling loss detection timer. 2025/04/30 09:12:41 client -> Sending packet 1 (45 bytes) for connection d3ae2e4cc790522f1de2d27c, Handshake 2025/04/30 09:12:41 client Long Header{Type: Handshake, DestConnectionID: 0a8fe7f7863620c1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:12:41 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:42 client <- Reading packet 7 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a8fe7f7863620c1, PacketNumber: 7, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:12:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d3ae2e4cc790522f1de2d27c, InitialSourceConnectionID: 0a8fe7f7863620c1, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7275253ec3f97c3e0a441a1d4830668d} 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 31.064ms} 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:42 client <- Reading packet 8 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a8fe7f7863620c1, PacketNumber: 8, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 31.064ms} 2025/04/30 09:12:42 client -> Sending packet 2 (84 bytes) for connection d3ae2e4cc790522f1de2d27c, Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 0a8fe7f7863620c1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:42 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.NewTokenFrame{Token: 0xe0ab9bead0b259ccf65c827fd1047e44b43991988bd8cd1ed084f8b1dfec0833329b30c05e94a3cdcd5d29c8dedf7092d118} 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0bb26c6bde4151cc, StatelessResetToken: 0x04757089c916a07415f74411ab7b87c3} 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b9ffc1a05da607e7, StatelessResetToken: 0x9481fc1de34b573b096a73c92239a635} 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 63af559b4f890ab0, StatelessResetToken: 0x757866b6333f6f4096f74b881c8bfb2a} 2025/04/30 09:12:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:42 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client -> Sending packet 0 (59 bytes) for connection d3ae2e4cc790522f1de2d27c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 0bb26c6bde4151cc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 546.172847ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:42 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:42 client newly acked packets (1): [0] 2025/04/30 09:12:42 client updated RTT: 252.329ms (σ: 169.47ms) 2025/04/30 09:12:42 client ECN capability confirmed. 2025/04/30 09:12:42 client Canceling loss detection timer. 2025/04/30 09:12:42 client Dropping Handshake keys. 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fdf440f36806309d, StatelessResetToken: 0xb417497bcdc4363839f682e1cb9f5b48} 2025/04/30 09:12:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:42 client Ignoring all packets below 2. 2025/04/30 09:12:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:42 client -> Sending packet 1 (30 bytes) for connection d3ae2e4cc790522f1de2d27c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 0bb26c6bde4151cc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:42 client Connection d3ae2e4cc790522f1de2d27c closed. 2025/04/30 09:12:42 Requesting https://server4:443/qnatgvznqp. 2025/04/30 09:12:42 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:42 Increased send buffer size to 14336 kiB 2025/04/30 09:12:42 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:42 Created qlog file: /logs/qlog/cce991ec82ee7046ea3758dbc4.sqlog 2025/04/30 09:12:42 client Starting new connection to server4 ([::]:36323 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cce991ec82ee7046ea3758dbc4, version v1 2025/04/30 09:12:42 Adding connection ID (empty). 2025/04/30 09:12:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:42 client -> Sending packet 0 (1280 bytes) for connection cce991ec82ee7046ea3758dbc4, Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: cce991ec82ee7046ea3758dbc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:42 client <- Reading packet 73086 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8a64e70c45a84ce4, Token: (empty), PacketNumber: 73086, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:42 client Received first packet. Switching destination connection ID to: 8a64e70c45a84ce4 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 448µs} 2025/04/30 09:12:42 client newly acked packets (1): [0] 2025/04/30 09:12:42 client updated RTT: 33.064135ms (σ: 16.532067ms) 2025/04/30 09:12:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 368 bytes. 2025/04/30 09:12:42 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8a64e70c45a84ce4, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/04/30 09:12:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:12:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cce991ec82ee7046ea3758dbc4, InitialSourceConnectionID: 8a64e70c45a84ce4, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1c59cafa69be6b3b3d83fb7559207b08} 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 3: 368 bytes. Remaining: 0 bytes. 2025/04/30 09:12:42 client <- Reading packet 1 (368 bytes) for connection (empty), Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8a64e70c45a84ce4, PacketNumber: 1, PacketNumberLen: 4, Length: 351, Version: v1} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cce991ec82ee7046ea3758dbc4 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: 8a64e70c45a84ce4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 73086, LowestAcked: 73086, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 8a64e70c45a84ce4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:42 client Dropping Initial keys. 2025/04/30 09:12:42 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.NewTokenFrame{Token: 0xf4e488e82e50e44f75a649cc33747db5dd8ed7e4b399517619123819d2f7a3153745ffa953ddbd72d7cf4f6ac91a1b852202} 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5bd45bfc974ee13e, StatelessResetToken: 0x1ac8b097608f80922b5844e705660c7a} 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5b3c145aaa83b2e7, StatelessResetToken: 0x0728a28d3e854c3cd178b7bc22d58579} 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf19442140e097a5, StatelessResetToken: 0xe81bdd938c2c2f3791defe40afaa0e1d} 2025/04/30 09:12:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:42 client -> Sending packet 1 (91 bytes) for connection cce991ec82ee7046ea3758dbc4, Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 5bd45bfc974ee13e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:42 client Short Header{DestConnectionID: 5bd45bfc974ee13e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:42 client -> Sending packet 1 (36 bytes) for connection cce991ec82ee7046ea3758dbc4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 5bd45bfc974ee13e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 546.161µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:42 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:42 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:42 client -> Sending packet 2 (36 bytes) for connection cce991ec82ee7046ea3758dbc4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 5bd45bfc974ee13e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.299933ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:42 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 24µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:42 client Peer doesn't await address validation any longer. 2025/04/30 09:12:42 client newly acked packets (1): [0] 2025/04/30 09:12:42 client Canceling loss detection timer. 2025/04/30 09:12:42 client Dropping Handshake keys. 2025/04/30 09:12:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ca61ece65c722996, StatelessResetToken: 0xc7d0f9953f5b6908ab7daf96d2522421} 2025/04/30 09:12:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:42 client -> Sending packet 3 (30 bytes) for connection cce991ec82ee7046ea3758dbc4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 5bd45bfc974ee13e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:42 client Connection cce991ec82ee7046ea3758dbc4 closed. 2025/04/30 09:12:42 Requesting https://server4:443/auqeqowpjd. 2025/04/30 09:12:42 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:42 Increased send buffer size to 14336 kiB 2025/04/30 09:12:42 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:42 Created qlog file: /logs/qlog/8f82e1c7e1e257b7509fd39fb1773fc3b9.sqlog 2025/04/30 09:12:42 client Starting new connection to server4 ([::]:34479 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8f82e1c7e1e257b7509fd39fb1773fc3b9, version v1 2025/04/30 09:12:42 Adding connection ID (empty). 2025/04/30 09:12:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:42 client -> Sending packet 0 (1280 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: 8f82e1c7e1e257b7509fd39fb1773fc3b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:42 client <- Reading packet 111245 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ba87d8c613ae74d, Token: (empty), PacketNumber: 111245, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:42 client Received first packet. Switching destination connection ID to: 9ba87d8c613ae74d 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 09:12:42 client newly acked packets (1): [0] 2025/04/30 09:12:42 client updated RTT: 32.978684ms (σ: 16.489342ms) 2025/04/30 09:12:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 2: 752 bytes. Remaining: 363 bytes. 2025/04/30 09:12:42 client <- Reading packet 0 (752 bytes) for connection (empty), Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ba87d8c613ae74d, PacketNumber: 0, PacketNumberLen: 4, Length: 735, Version: v1} 2025/04/30 09:12:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:12:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8f82e1c7e1e257b7509fd39fb1773fc3b9, InitialSourceConnectionID: 9ba87d8c613ae74d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x81e827a522f852f6dcedfb3ce76ece46} 2025/04/30 09:12:42 client Parsed a coalesced packet. Part 3: 363 bytes. Remaining: 0 bytes. 2025/04/30 09:12:42 client <- Reading packet 1 (363 bytes) for connection (empty), Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ba87d8c613ae74d, PacketNumber: 1, PacketNumberLen: 4, Length: 346, Version: v1} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: 9ba87d8c613ae74d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 111245, LowestAcked: 111245, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 9ba87d8c613ae74d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:42 client Dropping Initial keys. 2025/04/30 09:12:42 client -> Sending packet 1 (43 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 9ba87d8c613ae74d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:42 client -> Sending packet 0 (46 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 9ba87d8c613ae74d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:42 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:42 client -> Sending packet 1 (35 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 9ba87d8c613ae74d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 66.113µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:42 client -> Sending packet 2 (74 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 9ba87d8c613ae74d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:42 client -> Sending packet 3 (74 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, Handshake 2025/04/30 09:12:42 client Long Header{Type: Handshake, DestConnectionID: 9ba87d8c613ae74d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:42 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.PingFrame{} 2025/04/30 09:12:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:42 client -> Sending packet 2 (37 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 9ba87d8c613ae74d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 113.933µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:42 client <- Reading packet 6 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:42 client Dropping Handshake keys. 2025/04/30 09:12:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 30.888ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:42 client newly acked packets (1): [0] 2025/04/30 09:12:42 client ECN capability confirmed. 2025/04/30 09:12:42 client Canceling loss detection timer. 2025/04/30 09:12:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:42 client -> Sending packet 3 (39 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 9ba87d8c613ae74d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 111.708µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:42 client <- Reading packet 9 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:42 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:42 client -> Sending packet 4 (41 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 9ba87d8c613ae74d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 78.747µs, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:42 client -> Sending packet 5 (30 bytes) for connection 8f82e1c7e1e257b7509fd39fb1773fc3b9, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:42 client Short Header{DestConnectionID: 9ba87d8c613ae74d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:42 client Connection 8f82e1c7e1e257b7509fd39fb1773fc3b9 closed. 2025/04/30 09:12:42 Requesting https://server4:443/vqqniioumx. 2025/04/30 09:12:42 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:42 Increased send buffer size to 14336 kiB 2025/04/30 09:12:42 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:42 Created qlog file: /logs/qlog/64e4a02c8149a78fabbd7fa0.sqlog 2025/04/30 09:12:42 client Starting new connection to server4 ([::]:34254 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 64e4a02c8149a78fabbd7fa0, version v1 2025/04/30 09:12:42 Adding connection ID (empty). 2025/04/30 09:12:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:42 client -> Sending packet 0 (1280 bytes) for connection 64e4a02c8149a78fabbd7fa0, Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: 64e4a02c8149a78fabbd7fa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:42 client -> Sending packet 1 (1280 bytes) for connection 64e4a02c8149a78fabbd7fa0, Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: 64e4a02c8149a78fabbd7fa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:42 client -> Sending packet 2 (1280 bytes) for connection 64e4a02c8149a78fabbd7fa0, Initial 2025/04/30 09:12:42 client Long Header{Type: Initial, DestConnectionID: 64e4a02c8149a78fabbd7fa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:43 client -> Sending packet 3 (1280 bytes) for connection 64e4a02c8149a78fabbd7fa0, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 64e4a02c8149a78fabbd7fa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:43 client -> Sending packet 4 (1280 bytes) for connection 64e4a02c8149a78fabbd7fa0, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 64e4a02c8149a78fabbd7fa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:43 client <- Reading packet 109622 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 71bfd3189e3c9979, Token: (empty), PacketNumber: 109622, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:43 client Received first packet. Switching destination connection ID to: 71bfd3189e3c9979 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 504µs} 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 368 bytes. 2025/04/30 09:12:43 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 71bfd3189e3c9979, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:12:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 64e4a02c8149a78fabbd7fa0, InitialSourceConnectionID: 71bfd3189e3c9979, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x575c28b8a862a23b8c2066a2edec2737} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 3: 368 bytes. Remaining: 0 bytes. 2025/04/30 09:12:43 client <- Reading packet 1 (368 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 71bfd3189e3c9979, PacketNumber: 1, PacketNumberLen: 4, Length: 351, Version: v1} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 64e4a02c8149a78fabbd7fa0 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 71bfd3189e3c9979, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 109622, LowestAcked: 109622, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 71bfd3189e3c9979, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client Dropping Initial keys. 2025/04/30 09:12:43 client -> Sending packet 1 (43 bytes) for connection 64e4a02c8149a78fabbd7fa0, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 71bfd3189e3c9979, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client -> Sending packet 0 (46 bytes) for connection 64e4a02c8149a78fabbd7fa0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 71bfd3189e3c9979, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:43 client -> Sending packet 1 (35 bytes) for connection 64e4a02c8149a78fabbd7fa0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 71bfd3189e3c9979, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 61.956µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:43 client -> Sending packet 2 (74 bytes) for connection 64e4a02c8149a78fabbd7fa0, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 71bfd3189e3c9979, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client -> Sending packet 3 (74 bytes) for connection 64e4a02c8149a78fabbd7fa0, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 71bfd3189e3c9979, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 199.144ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:43 client Peer doesn't await address validation any longer. 2025/04/30 09:12:43 client newly acked packets (1): [0] 2025/04/30 09:12:43 client ECN capability confirmed. 2025/04/30 09:12:43 client Canceling loss detection timer. 2025/04/30 09:12:43 client Dropping Handshake keys. 2025/04/30 09:12:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client -> Sending packet 2 (1360 bytes) for connection 64e4a02c8149a78fabbd7fa0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 71bfd3189e3c9979, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.PingFrame{} 2025/04/30 09:12:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:43 client -> Sending packet 3 (30 bytes) for connection 64e4a02c8149a78fabbd7fa0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 71bfd3189e3c9979, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:43 client Connection 64e4a02c8149a78fabbd7fa0 closed. 2025/04/30 09:12:43 Requesting https://server4:443/qmibbcmcuo. 2025/04/30 09:12:43 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:43 Increased send buffer size to 14336 kiB 2025/04/30 09:12:43 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:43 Created qlog file: /logs/qlog/1820be302c7d818f.sqlog 2025/04/30 09:12:43 client Starting new connection to server4 ([::]:37335 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1820be302c7d818f, version v1 2025/04/30 09:12:43 Adding connection ID (empty). 2025/04/30 09:12:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:43 client -> Sending packet 0 (1280 bytes) for connection 1820be302c7d818f, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 1820be302c7d818f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:43 client <- Reading packet 85815 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bc5e490e89deec55, Token: (empty), PacketNumber: 85815, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:43 client Received first packet. Switching destination connection ID to: bc5e490e89deec55 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 09:12:43 client newly acked packets (1): [0] 2025/04/30 09:12:43 client updated RTT: 33.324462ms (σ: 16.662231ms) 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 372 bytes. 2025/04/30 09:12:43 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bc5e490e89deec55, PacketNumber: 0, PacketNumberLen: 4, Length: 726, Version: v1} 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1820be302c7d818f, InitialSourceConnectionID: bc5e490e89deec55, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x8b3cc75bde16351578e32b9f8a77eb29} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 3: 372 bytes. Remaining: 0 bytes. 2025/04/30 09:12:43 client <- Reading packet 1 (372 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bc5e490e89deec55, PacketNumber: 1, PacketNumberLen: 4, Length: 355, Version: v1} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1820be302c7d818f 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: bc5e490e89deec55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 85815, LowestAcked: 85815, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: bc5e490e89deec55, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client Dropping Initial keys. 2025/04/30 09:12:43 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.NewTokenFrame{Token: 0xb3d683295822995290b41350211814074c4a940b160d706ae2a836ff75b9ce2f252a5623c9b54e1a26875bec47dff07f1456} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7260dee89a1fcc53, StatelessResetToken: 0x6dd83fa895e067339d3feca80bc25bdd} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 58b030fe27f61d72, StatelessResetToken: 0xf25fa7eba9b6b069c43aa8bafba50cd9} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 711e1a6cc4cd34df, StatelessResetToken: 0x73a8f96e4e1600f4fce5b7d577cc8b2a} 2025/04/30 09:12:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:43 client -> Sending packet 1 (91 bytes) for connection 1820be302c7d818f, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 7260dee89a1fcc53, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client -> Sending packet 1 (35 bytes) for connection 1820be302c7d818f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 469.387µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:43 client -> Sending packet 2 (36 bytes) for connection 1820be302c7d818f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.234379ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:43 client Dropping Handshake keys. 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:43 client -> Sending packet 3 (36 bytes) for connection 1820be302c7d818f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.24522ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:43 client -> Sending packet 5 (48 bytes) for connection 1820be302c7d818f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client -> Sending packet 6 (48 bytes) for connection 1820be302c7d818f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client <- Reading packet 3 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 72µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3dae91f24c78ec98, StatelessResetToken: 0x8ff3d617ed47738327573c77aaf4e3c5} 2025/04/30 09:12:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:43 client -> Sending packet 7 (30 bytes) for connection 1820be302c7d818f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 7260dee89a1fcc53, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:43 client Connection 1820be302c7d818f closed. 2025/04/30 09:12:43 Requesting https://server4:443/bowpigwcva. 2025/04/30 09:12:43 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:43 Increased send buffer size to 14336 kiB 2025/04/30 09:12:43 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:43 Created qlog file: /logs/qlog/35b7f98dec09ddbfe3d620.sqlog 2025/04/30 09:12:43 client Starting new connection to server4 ([::]:58286 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 35b7f98dec09ddbfe3d620, version v1 2025/04/30 09:12:43 Adding connection ID (empty). 2025/04/30 09:12:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:43 client -> Sending packet 0 (1280 bytes) for connection 35b7f98dec09ddbfe3d620, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 35b7f98dec09ddbfe3d620, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:43 client <- Reading packet 81794 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 89b597bd15c7f7aa, Token: (empty), PacketNumber: 81794, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:43 client Received first packet. Switching destination connection ID to: 89b597bd15c7f7aa 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 09:12:43 client newly acked packets (1): [0] 2025/04/30 09:12:43 client updated RTT: 32.964259ms (σ: 16.482129ms) 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 369 bytes. 2025/04/30 09:12:43 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 89b597bd15c7f7aa, PacketNumber: 0, PacketNumberLen: 4, Length: 729, Version: v1} 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:12:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 35b7f98dec09ddbfe3d620, InitialSourceConnectionID: 89b597bd15c7f7aa, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x33cdb7c2af79f5723a64b4ee2a86f935} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 3: 369 bytes. Remaining: 0 bytes. 2025/04/30 09:12:43 client <- Reading packet 1 (369 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 89b597bd15c7f7aa, PacketNumber: 1, PacketNumberLen: 4, Length: 352, Version: v1} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 35b7f98dec09ddbfe3d620 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 89b597bd15c7f7aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 81794, LowestAcked: 81794, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 89b597bd15c7f7aa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client Dropping Initial keys. 2025/04/30 09:12:43 client -> Sending packet 1 (43 bytes) for connection 35b7f98dec09ddbfe3d620, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 89b597bd15c7f7aa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client -> Sending packet 0 (46 bytes) for connection 35b7f98dec09ddbfe3d620, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 89b597bd15c7f7aa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:43 client Peer doesn't await address validation any longer. 2025/04/30 09:12:43 client newly acked packets (1): [0] 2025/04/30 09:12:43 client updated RTT: 32.922ms (σ: 12.444ms) 2025/04/30 09:12:43 client ECN capability confirmed. 2025/04/30 09:12:43 client Canceling loss detection timer. 2025/04/30 09:12:43 client Dropping Handshake keys. 2025/04/30 09:12:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:43 client -> Sending packet 1 (35 bytes) for connection 35b7f98dec09ddbfe3d620, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 89b597bd15c7f7aa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 108.372µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:43 client -> Sending packet 2 (30 bytes) for connection 35b7f98dec09ddbfe3d620, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 89b597bd15c7f7aa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:43 client Connection 35b7f98dec09ddbfe3d620 closed. 2025/04/30 09:12:43 Requesting https://server4:443/natulwjnxa. 2025/04/30 09:12:43 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:43 Increased send buffer size to 14336 kiB 2025/04/30 09:12:43 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:43 Created qlog file: /logs/qlog/c5ef8f38a29d25430b72.sqlog 2025/04/30 09:12:43 client Starting new connection to server4 ([::]:59887 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c5ef8f38a29d25430b72, version v1 2025/04/30 09:12:43 Adding connection ID (empty). 2025/04/30 09:12:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:43 client -> Sending packet 0 (1280 bytes) for connection c5ef8f38a29d25430b72, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: c5ef8f38a29d25430b72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:43 client <- Reading packet 88236 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 592baf42aa855a0b, Token: (empty), PacketNumber: 88236, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:43 client Received first packet. Switching destination connection ID to: 592baf42aa855a0b 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 09:12:43 client newly acked packets (1): [0] 2025/04/30 09:12:43 client updated RTT: 32.976049ms (σ: 16.488024ms) 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 371 bytes. 2025/04/30 09:12:43 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 592baf42aa855a0b, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c5ef8f38a29d25430b72, InitialSourceConnectionID: 592baf42aa855a0b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9218d14a8ff3a8ad26e5635d820a2710} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 3: 371 bytes. Remaining: 0 bytes. 2025/04/30 09:12:43 client <- Reading packet 1 (371 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 592baf42aa855a0b, PacketNumber: 1, PacketNumberLen: 4, Length: 354, Version: v1} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c5ef8f38a29d25430b72 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 592baf42aa855a0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 88236, LowestAcked: 88236, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 592baf42aa855a0b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client Dropping Initial keys. 2025/04/30 09:12:43 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.NewTokenFrame{Token: 0xb344a84837fba7103045ae715fb664de902af224e39c3ed2d041342aacf7d7a6b9a528853cab41057ee7e4feb9900b9e124b} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 31b133580e8ad203, StatelessResetToken: 0x0756f1eb939b23174e3081029fcfdf16} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b27054a5370f655a, StatelessResetToken: 0xc1ede9aa28d1f71636fbd7158ee026de} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b34f4b28ad27dafb, StatelessResetToken: 0x1d3f7cfb9e3b20dceff4ff0f64a454f4} 2025/04/30 09:12:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:43 client -> Sending packet 1 (91 bytes) for connection c5ef8f38a29d25430b72, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 31b133580e8ad203, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client -> Sending packet 1 (36 bytes) for connection c5ef8f38a29d25430b72, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 640.203µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:43 client -> Sending packet 2 (36 bytes) for connection c5ef8f38a29d25430b72, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.224283ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:43 client -> Sending packet 2 (74 bytes) for connection c5ef8f38a29d25430b72, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 31b133580e8ad203, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client -> Sending packet 3 (74 bytes) for connection c5ef8f38a29d25430b72, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 31b133580e8ad203, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:43 client Dropping Handshake keys. 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 85.24ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:43 client -> Sending packet 4 (58 bytes) for connection c5ef8f38a29d25430b72, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 86.211µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client -> Sending packet 5 (48 bytes) for connection c5ef8f38a29d25430b72, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:43 client -> Sending packet 6 (38 bytes) for connection c5ef8f38a29d25430b72, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.234121ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:43 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:43 client newly acked packets (1): [5] 2025/04/30 09:12:43 client updated RTT: 32.831ms (σ: 12.654ms) 2025/04/30 09:12:43 client ECN capability confirmed. 2025/04/30 09:12:43 client Canceling loss detection timer. 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0d4ab46fe019b16e, StatelessResetToken: 0x13fc68c5b30a5edfbf952cba0dcac839} 2025/04/30 09:12:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:43 client -> Sending packet 7 (30 bytes) for connection c5ef8f38a29d25430b72, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: 31b133580e8ad203, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:43 client Connection c5ef8f38a29d25430b72 closed. 2025/04/30 09:12:43 Requesting https://server4:443/ewucxgupgf. 2025/04/30 09:12:43 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:43 Increased send buffer size to 14336 kiB 2025/04/30 09:12:43 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:43 Created qlog file: /logs/qlog/830095e8e27b8e616baf8d6d843a03.sqlog 2025/04/30 09:12:43 client Starting new connection to server4 ([::]:56722 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 830095e8e27b8e616baf8d6d843a03, version v1 2025/04/30 09:12:43 Adding connection ID (empty). 2025/04/30 09:12:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:43 client -> Sending packet 0 (1280 bytes) for connection 830095e8e27b8e616baf8d6d843a03, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 830095e8e27b8e616baf8d6d843a03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:43 client -> Sending packet 1 (1280 bytes) for connection 830095e8e27b8e616baf8d6d843a03, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 830095e8e27b8e616baf8d6d843a03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:43 client -> Sending packet 2 (1280 bytes) for connection 830095e8e27b8e616baf8d6d843a03, Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 830095e8e27b8e616baf8d6d843a03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:43 client <- Reading packet 130892 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ef4469d8eeec68b, Token: (empty), PacketNumber: 130892, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:43 client Received first packet. Switching destination connection ID to: 9ef4469d8eeec68b 2025/04/30 09:12:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 408µs} 2025/04/30 09:12:43 client newly acked packets (1): [2] 2025/04/30 09:12:43 client updated RTT: 34.028994ms (σ: 17.014497ms) 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 2: 750 bytes. Remaining: 365 bytes. 2025/04/30 09:12:43 client <- Reading packet 0 (750 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ef4469d8eeec68b, PacketNumber: 0, PacketNumberLen: 4, Length: 733, Version: v1} 2025/04/30 09:12:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 09:12:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 830095e8e27b8e616baf8d6d843a03, InitialSourceConnectionID: 9ef4469d8eeec68b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2daef6298864f9c7b9f6356b4798f157} 2025/04/30 09:12:43 client Parsed a coalesced packet. Part 3: 365 bytes. Remaining: 0 bytes. 2025/04/30 09:12:43 client <- Reading packet 1 (365 bytes) for connection (empty), Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ef4469d8eeec68b, PacketNumber: 1, PacketNumberLen: 4, Length: 348, Version: v1} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 830095e8e27b8e616baf8d6d843a03 2025/04/30 09:12:43 client Long Header{Type: Initial, DestConnectionID: 9ef4469d8eeec68b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1142, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 130892, LowestAcked: 130892, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: 9ef4469d8eeec68b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:43 client Short Header{DestConnectionID: 9ef4469d8eeec68b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:43 client Dropping Initial keys. 2025/04/30 09:12:43 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.NewTokenFrame{Token: 0xc1dfa6e4d5930725dad3d09dd3f8d55b816f9f59f81b476f868c86cb9b69a555ed10b41824ed27c039d81d78d6e64c9f3476} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e51ee0297b9b8926, StatelessResetToken: 0x9ea0d43b79e29da30b53a3a28290cb4c} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b1640f4ebc11b776, StatelessResetToken: 0xb730e4d4f56605ddc885bbc39c6103b3} 2025/04/30 09:12:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d75afc139e39ec00, StatelessResetToken: 0xd6484ae8cde8d5efc92c50558faa28ec} 2025/04/30 09:12:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:43 client -> Sending packet 1 (75 bytes) for connection 830095e8e27b8e616baf8d6d843a03, Handshake 2025/04/30 09:12:43 client Long Header{Type: Handshake, DestConnectionID: e51ee0297b9b8926, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:43 client Short Header{DestConnectionID: e51ee0297b9b8926, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 17, Data length: 0, Offset + Data length: 17} 2025/04/30 09:12:43 client -> Sending packet 2 (36 bytes) for connection 830095e8e27b8e616baf8d6d843a03, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: e51ee0297b9b8926, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 643.451µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:43 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:43 client <- &wire.PingFrame{} 2025/04/30 09:12:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:43 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:43 client -> Sending packet 3 (36 bytes) for connection 830095e8e27b8e616baf8d6d843a03, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:43 client Short Header{DestConnectionID: e51ee0297b9b8926, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.226388ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc0c6c07553d0b4d, StatelessResetToken: 0x72ea2315c7c9b43084f7df90a62e3c18} 2025/04/30 09:12:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:44 client Dropping Handshake keys. 2025/04/30 09:12:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:44 client -> Sending packet 4 (37 bytes) for connection 830095e8e27b8e616baf8d6d843a03, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: e51ee0297b9b8926, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 84.428µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:44 client -> Sending packet 5 (30 bytes) for connection 830095e8e27b8e616baf8d6d843a03, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: e51ee0297b9b8926, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:44 client Connection 830095e8e27b8e616baf8d6d843a03 closed. 2025/04/30 09:12:44 Requesting https://server4:443/zyxcsougvx. 2025/04/30 09:12:44 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:44 Increased send buffer size to 14336 kiB 2025/04/30 09:12:44 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:44 Created qlog file: /logs/qlog/70b625c9fd230e724230bf66.sqlog 2025/04/30 09:12:44 client Starting new connection to server4 ([::]:50966 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 70b625c9fd230e724230bf66, version v1 2025/04/30 09:12:44 Adding connection ID (empty). 2025/04/30 09:12:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:44 client -> Sending packet 0 (1280 bytes) for connection 70b625c9fd230e724230bf66, Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: 70b625c9fd230e724230bf66, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:12:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:44 client -> Sending packet 1 (1280 bytes) for connection 70b625c9fd230e724230bf66, Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: 70b625c9fd230e724230bf66, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:12:44 client -> Sending packet 2 (1280 bytes) for connection 70b625c9fd230e724230bf66, Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: 70b625c9fd230e724230bf66, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:44 client <- Reading packet 128419 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dd460a5cad761947, Token: (empty), PacketNumber: 128419, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:44 client Received first packet. Switching destination connection ID to: dd460a5cad761947 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 488µs} 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 369 bytes. 2025/04/30 09:12:44 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dd460a5cad761947, PacketNumber: 0, PacketNumberLen: 4, Length: 729, Version: v1} 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:12:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 70b625c9fd230e724230bf66, InitialSourceConnectionID: dd460a5cad761947, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3c72684d41f5bad62987663caa4de1f4} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 3: 369 bytes. Remaining: 0 bytes. 2025/04/30 09:12:44 client <- Reading packet 1 (369 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dd460a5cad761947, PacketNumber: 1, PacketNumberLen: 4, Length: 352, Version: v1} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 70b625c9fd230e724230bf66 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: dd460a5cad761947, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1142, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 128419, LowestAcked: 128419, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: dd460a5cad761947, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client Dropping Initial keys. 2025/04/30 09:12:44 client -> Sending packet 1 (43 bytes) for connection 70b625c9fd230e724230bf66, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: dd460a5cad761947, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:44 client -> Sending packet 1 (35 bytes) for connection 70b625c9fd230e724230bf66, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 72.245µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:44 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:44 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dd460a5cad761947, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client -> Sending packet 2 (43 bytes) for connection 70b625c9fd230e724230bf66, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: dd460a5cad761947, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:44 client -> Sending packet 3 (74 bytes) for connection 70b625c9fd230e724230bf66, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: dd460a5cad761947, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:44 client -> Sending packet 4 (74 bytes) for connection 70b625c9fd230e724230bf66, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: dd460a5cad761947, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:44 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:44 client Dropping Handshake keys. 2025/04/30 09:12:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:44 client -> Sending packet 3 (54 bytes) for connection 70b625c9fd230e724230bf66, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 82.003µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 4 (46 bytes) for connection 70b625c9fd230e724230bf66, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 5 (1360 bytes) for connection 70b625c9fd230e724230bf66, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.PingFrame{} 2025/04/30 09:12:44 client <- Reading packet 4 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:44 client newly acked packets (1): [4] 2025/04/30 09:12:44 client updated RTT: 31.652853ms (σ: 15.826426ms) 2025/04/30 09:12:44 client ECN capability confirmed. 2025/04/30 09:12:44 client Canceling loss detection timer. 2025/04/30 09:12:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:44 client -> Sending packet 6 (37 bytes) for connection 70b625c9fd230e724230bf66, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 133.85µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:44 client -> Sending packet 7 (30 bytes) for connection 70b625c9fd230e724230bf66, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: dd460a5cad761947, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:44 client Connection 70b625c9fd230e724230bf66 closed. 2025/04/30 09:12:44 Requesting https://server4:443/hxpenmghfi. 2025/04/30 09:12:44 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:44 Increased send buffer size to 14336 kiB 2025/04/30 09:12:44 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:44 Created qlog file: /logs/qlog/a55d52a04952cb77.sqlog 2025/04/30 09:12:44 client Starting new connection to server4 ([::]:45053 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a55d52a04952cb77, version v1 2025/04/30 09:12:44 Adding connection ID (empty). 2025/04/30 09:12:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:44 client -> Sending packet 0 (1280 bytes) for connection a55d52a04952cb77, Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: a55d52a04952cb77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:44 client <- Reading packet 79081 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a726b3243f9e6e9f, Token: (empty), PacketNumber: 79081, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:44 client Received first packet. Switching destination connection ID to: a726b3243f9e6e9f 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 09:12:44 client newly acked packets (1): [0] 2025/04/30 09:12:44 client updated RTT: 33.020324ms (σ: 16.510162ms) 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 372 bytes. 2025/04/30 09:12:44 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a726b3243f9e6e9f, PacketNumber: 0, PacketNumberLen: 4, Length: 726, Version: v1} 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a55d52a04952cb77, InitialSourceConnectionID: a726b3243f9e6e9f, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xf2de0c9599e4e5b7f58ce498096caf24} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 3: 372 bytes. Remaining: 0 bytes. 2025/04/30 09:12:44 client <- Reading packet 1 (372 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a726b3243f9e6e9f, PacketNumber: 1, PacketNumberLen: 4, Length: 355, Version: v1} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a55d52a04952cb77 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: a726b3243f9e6e9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 79081, LowestAcked: 79081, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: a726b3243f9e6e9f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:44 client Dropping Initial keys. 2025/04/30 09:12:44 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.NewTokenFrame{Token: 0x87bd778932bfedb8c339fd143e73c33e20b1c65c39d2fc2936e2dd9ef750e6f9ea4af01658f03618d0bef05df38cba0210e7} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70fe1fefe00db136, StatelessResetToken: 0x62249d9e204727d2d1387bdaa738ead4} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cd12e133c6c52c7d, StatelessResetToken: 0x808f755fbc4c771936c91ca30a154f61} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e6acd0417215ded9, StatelessResetToken: 0xeacdee7a9bbc08aa6973c05364da28e4} 2025/04/30 09:12:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:44 client -> Sending packet 1 (91 bytes) for connection a55d52a04952cb77, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: 70fe1fefe00db136, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 1 (36 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 619.699µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:44 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:44 client -> Sending packet 2 (36 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.264259ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:44 client Dropping Handshake keys. 2025/04/30 09:12:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:44 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:44 client -> Sending packet 3 (36 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.285106ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:44 client -> Sending packet 5 (48 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 6 (48 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:12:44 client -> Sending packet 8 (48 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 9 (48 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 10 (1360 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.PingFrame{} 2025/04/30 09:12:44 client <- Reading packet 3 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 3, Smallest: 1}}, DelayTime: 32µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:12:44 client newly acked packets (1): [9] 2025/04/30 09:12:44 client updated RTT: 32.875ms (σ: 12.672ms) 2025/04/30 09:12:44 client ECN capability confirmed. 2025/04/30 09:12:44 client Canceling loss detection timer. 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 080130fed3e325df, StatelessResetToken: 0x2ff1f8e47369d586511170d6a9159a47} 2025/04/30 09:12:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:44 client -> Sending packet 11 (30 bytes) for connection a55d52a04952cb77, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 70fe1fefe00db136, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:44 client Connection a55d52a04952cb77 closed. 2025/04/30 09:12:44 Requesting https://server4:443/tetfsdlgic. 2025/04/30 09:12:44 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:44 Increased send buffer size to 14336 kiB 2025/04/30 09:12:44 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:44 Created qlog file: /logs/qlog/a158bfa6f8cae37a2f1f74e012.sqlog 2025/04/30 09:12:44 client Starting new connection to server4 ([::]:54052 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a158bfa6f8cae37a2f1f74e012, version v1 2025/04/30 09:12:44 Adding connection ID (empty). 2025/04/30 09:12:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:44 client -> Sending packet 0 (1280 bytes) for connection a158bfa6f8cae37a2f1f74e012, Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: a158bfa6f8cae37a2f1f74e012, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:44 client <- Reading packet 72707 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d2b0732fb550062, Token: (empty), PacketNumber: 72707, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:44 client Received first packet. Switching destination connection ID to: 5d2b0732fb550062 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 09:12:44 client newly acked packets (1): [0] 2025/04/30 09:12:44 client updated RTT: 33.002219ms (σ: 16.501109ms) 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 366 bytes. 2025/04/30 09:12:44 client <- Reading packet 0 (749 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d2b0732fb550062, PacketNumber: 0, PacketNumberLen: 4, Length: 732, Version: v1} 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:12:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a158bfa6f8cae37a2f1f74e012, InitialSourceConnectionID: 5d2b0732fb550062, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2021b27b4025e43e949787a5c09f278c} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 3: 366 bytes. Remaining: 0 bytes. 2025/04/30 09:12:44 client <- Reading packet 1 (366 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d2b0732fb550062, PacketNumber: 1, PacketNumberLen: 4, Length: 349, Version: v1} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a158bfa6f8cae37a2f1f74e012 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: 5d2b0732fb550062, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 72707, LowestAcked: 72707, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: 5d2b0732fb550062, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:44 client Dropping Initial keys. 2025/04/30 09:12:44 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.NewTokenFrame{Token: 0xe23c886c52e432f2255c5fa972ab3d06f04bceb541d252621444d0de2f23562569e018bccffb2a056d1737d847a858bdf0be} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 42e93bf89c432496, StatelessResetToken: 0x034b40cbe9e7ea7074ea3b077f5dd7f0} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b2c80f1eee6bf0f, StatelessResetToken: 0xcf88db5701189f3d924a6f5643c814e4} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e3cdbb12f5c638ad, StatelessResetToken: 0xa5469786dd886679f62fe31bdc7c029d} 2025/04/30 09:12:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:44 client -> Sending packet 1 (91 bytes) for connection a158bfa6f8cae37a2f1f74e012, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: 42e93bf89c432496, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client Short Header{DestConnectionID: 42e93bf89c432496, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 1 (36 bytes) for connection a158bfa6f8cae37a2f1f74e012, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 42e93bf89c432496, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 641.197µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 09:12:44 client Peer doesn't await address validation any longer. 2025/04/30 09:12:44 client newly acked packets (1): [0] 2025/04/30 09:12:44 client updated RTT: 32.975ms (σ: 12.428ms) 2025/04/30 09:12:44 client Canceling loss detection timer. 2025/04/30 09:12:44 client Dropping Handshake keys. 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 72bf8cafdc258b11, StatelessResetToken: 0xbff0f088b1c4586f64a761ee2e720c89} 2025/04/30 09:12:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:44 client -> Sending packet 2 (37 bytes) for connection a158bfa6f8cae37a2f1f74e012, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 42e93bf89c432496, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 114.213µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:44 client -> Sending packet 3 (30 bytes) for connection a158bfa6f8cae37a2f1f74e012, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 42e93bf89c432496, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:44 client Connection a158bfa6f8cae37a2f1f74e012 closed. 2025/04/30 09:12:44 Requesting https://server4:443/fhzjzwzzzf. 2025/04/30 09:12:44 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:44 Increased send buffer size to 14336 kiB 2025/04/30 09:12:44 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:44 Created qlog file: /logs/qlog/a9020f18752aa11df9b536f1.sqlog 2025/04/30 09:12:44 client Starting new connection to server4 ([::]:60414 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9020f18752aa11df9b536f1, version v1 2025/04/30 09:12:44 Adding connection ID (empty). 2025/04/30 09:12:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:44 client -> Sending packet 0 (1280 bytes) for connection a9020f18752aa11df9b536f1, Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: a9020f18752aa11df9b536f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:44 client <- Reading packet 100036 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6a4009c4bf4f0e6, Token: (empty), PacketNumber: 100036, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:44 client Received first packet. Switching destination connection ID to: a6a4009c4bf4f0e6 2025/04/30 09:12:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 09:12:44 client newly acked packets (1): [0] 2025/04/30 09:12:44 client updated RTT: 32.987451ms (σ: 16.493725ms) 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 368 bytes. 2025/04/30 09:12:44 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6a4009c4bf4f0e6, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/04/30 09:12:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:12:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9020f18752aa11df9b536f1, InitialSourceConnectionID: a6a4009c4bf4f0e6, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1faee990a99500467869e0decd53021a} 2025/04/30 09:12:44 client Parsed a coalesced packet. Part 3: 368 bytes. Remaining: 0 bytes. 2025/04/30 09:12:44 client <- Reading packet 1 (368 bytes) for connection (empty), Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6a4009c4bf4f0e6, PacketNumber: 1, PacketNumberLen: 4, Length: 351, Version: v1} 2025/04/30 09:12:44 client <- &wire.PingFrame{} 2025/04/30 09:12:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a9020f18752aa11df9b536f1 2025/04/30 09:12:44 client Long Header{Type: Initial, DestConnectionID: a6a4009c4bf4f0e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 100036, LowestAcked: 100036, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: a6a4009c4bf4f0e6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:44 client Dropping Initial keys. 2025/04/30 09:12:44 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:44 client <- &wire.NewTokenFrame{Token: 0xa91c829250bfebb0f5aaace5b86ad0b91e24ecc0338179e8ecc0b5fa5ab220ed62a8383b87ca4006494690d9ea6ff1b730cd} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 06e28c15fe8778cc, StatelessResetToken: 0x69c95d8763082c51dd1ddb95823ac5d6} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a9dc6e49dea3193c, StatelessResetToken: 0xe6ab69507f32e76066a9276894fd83b4} 2025/04/30 09:12:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7117c290ab2341c8, StatelessResetToken: 0x7b50173caa9692d0172f0880ed20e5d7} 2025/04/30 09:12:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:44 client -> Sending packet 1 (91 bytes) for connection a9020f18752aa11df9b536f1, Handshake 2025/04/30 09:12:44 client Long Header{Type: Handshake, DestConnectionID: 06e28c15fe8778cc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:44 client Short Header{DestConnectionID: 06e28c15fe8778cc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:44 client -> Sending packet 1 (36 bytes) for connection a9020f18752aa11df9b536f1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:44 client Short Header{DestConnectionID: 06e28c15fe8778cc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 539.906µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:45 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:45 client Peer doesn't await address validation any longer. 2025/04/30 09:12:45 client newly acked packets (1): [0] 2025/04/30 09:12:45 client Canceling loss detection timer. 2025/04/30 09:12:45 client Dropping Handshake keys. 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: aa9037aded5bdd72, StatelessResetToken: 0xb67e382f9f891a19c30e53321632bcb6} 2025/04/30 09:12:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:45 client -> Sending packet 2 (37 bytes) for connection a9020f18752aa11df9b536f1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: 06e28c15fe8778cc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 110.036µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:45 client -> Sending packet 3 (30 bytes) for connection a9020f18752aa11df9b536f1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: 06e28c15fe8778cc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:45 client Connection a9020f18752aa11df9b536f1 closed. 2025/04/30 09:12:45 Requesting https://server4:443/alathcvagt. 2025/04/30 09:12:45 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:45 Increased send buffer size to 14336 kiB 2025/04/30 09:12:45 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:45 Created qlog file: /logs/qlog/755ebde134ac615b9c1f18f9f5da4d25.sqlog 2025/04/30 09:12:45 client Starting new connection to server4 ([::]:54480 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 755ebde134ac615b9c1f18f9f5da4d25, version v1 2025/04/30 09:12:45 Adding connection ID (empty). 2025/04/30 09:12:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:45 client -> Sending packet 0 (1280 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 755ebde134ac615b9c1f18f9f5da4d25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:45 client <- Reading packet 94279 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b4e27a2a4660600, Token: (empty), PacketNumber: 94279, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:45 client Received first packet. Switching destination connection ID to: 9b4e27a2a4660600 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 09:12:45 client newly acked packets (1): [0] 2025/04/30 09:12:45 client updated RTT: 32.925025ms (σ: 16.462512ms) 2025/04/30 09:12:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 364 bytes. 2025/04/30 09:12:45 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b4e27a2a4660600, PacketNumber: 0, PacketNumberLen: 4, Length: 734, Version: v1} 2025/04/30 09:12:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:12:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 755ebde134ac615b9c1f18f9f5da4d25, InitialSourceConnectionID: 9b4e27a2a4660600, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x71331a0c0186ed83dc3d31c869b89f97} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 3: 364 bytes. Remaining: 0 bytes. 2025/04/30 09:12:45 client <- Reading packet 1 (364 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b4e27a2a4660600, PacketNumber: 1, PacketNumberLen: 4, Length: 347, Version: v1} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 9b4e27a2a4660600, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 94279, LowestAcked: 94279, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: 9b4e27a2a4660600, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client Dropping Initial keys. 2025/04/30 09:12:45 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.NewTokenFrame{Token: 0xbfb6d9d82ae42ddc465bf99c734b48fe137592aeb358e9f2845fad9911984d650943f7cff99379eaebcf68d4d0b85c175488} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e472141bb96de480, StatelessResetToken: 0xd39c8c080c8fe7c5752782f2b167dac5} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 717a57c40d7b50f1, StatelessResetToken: 0xa152de2c223697c742787a17b3d96f47} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1a405159235ab75e, StatelessResetToken: 0xdd6990014361393f08d937038bed2c6a} 2025/04/30 09:12:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:45 client -> Sending packet 1 (91 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e472141bb96de480, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client -> Sending packet 1 (36 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.187237ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:45 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:45 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:45 client -> Sending packet 2 (36 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.238268ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:45 client -> Sending packet 2 (74 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e472141bb96de480, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client -> Sending packet 3 (74 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e472141bb96de480, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:12:45 client -> Sending packet 4 (74 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e472141bb96de480, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client -> Sending packet 5 (74 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e472141bb96de480, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:45 client Dropping Handshake keys. 2025/04/30 09:12:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:45 client -> Sending packet 4 (58 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 77.044µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client -> Sending packet 5 (48 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:45 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:45 client -> Sending packet 6 (38 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.233598ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:45 client <- Reading packet 5 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 128µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0fdbffdb2554c2ac, StatelessResetToken: 0x60d7487eedd366396161afd8723ee812} 2025/04/30 09:12:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:45 client -> Sending packet 7 (30 bytes) for connection 755ebde134ac615b9c1f18f9f5da4d25, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e472141bb96de480, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:45 client Connection 755ebde134ac615b9c1f18f9f5da4d25 closed. 2025/04/30 09:12:45 Requesting https://server4:443/lwzvkbhuuo. 2025/04/30 09:12:45 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:45 Increased send buffer size to 14336 kiB 2025/04/30 09:12:45 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:45 Created qlog file: /logs/qlog/4da1e9995e5075f965b0f8ba2981c683e7.sqlog 2025/04/30 09:12:45 client Starting new connection to server4 ([::]:54433 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4da1e9995e5075f965b0f8ba2981c683e7, version v1 2025/04/30 09:12:45 Adding connection ID (empty). 2025/04/30 09:12:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:45 client -> Sending packet 0 (1280 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 4da1e9995e5075f965b0f8ba2981c683e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:45 client -> Sending packet 1 (1280 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 4da1e9995e5075f965b0f8ba2981c683e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:45 client -> Sending packet 2 (1280 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 4da1e9995e5075f965b0f8ba2981c683e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:12:45 client <- Reading packet 93819 (138 bytes) for connection (empty), Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c6988713e4cf98f, Token: (empty), PacketNumber: 93819, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:12:45 client Received first packet. Switching destination connection ID to: 2c6988713e4cf98f 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 520µs} 2025/04/30 09:12:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 361 bytes. 2025/04/30 09:12:45 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c6988713e4cf98f, PacketNumber: 0, PacketNumberLen: 4, Length: 736, Version: v1} 2025/04/30 09:12:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 09:12:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4da1e9995e5075f965b0f8ba2981c683e7, InitialSourceConnectionID: 2c6988713e4cf98f, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x216a4793bb904c222c82699979ccf97a} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 3: 361 bytes. Remaining: 0 bytes. 2025/04/30 09:12:45 client <- Reading packet 1 (361 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c6988713e4cf98f, PacketNumber: 1, PacketNumberLen: 4, Length: 344, Version: v1} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 2c6988713e4cf98f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 93819, LowestAcked: 93819, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: 2c6988713e4cf98f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client Dropping Initial keys. 2025/04/30 09:12:45 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.NewTokenFrame{Token: 0xf434d65f1679c19ada2d6e72d1b5f53b723d265d846b0f44f079219cbd01725983fb2a44e541b001d9625b6bca2f6d634cea} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e1a1b20dc9a773ab, StatelessResetToken: 0x007e4b8cfd58e5cfedfb0157e02f6002} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 093ad0eaf78d429e, StatelessResetToken: 0xaa5289b93417bcb153fde1782fb65c96} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8157611661e7eac0, StatelessResetToken: 0xdb16e90bc1ae702b4eca287ee659066f} 2025/04/30 09:12:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:45 client -> Sending packet 1 (91 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e1a1b20dc9a773ab, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client -> Sending packet 1 (36 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 613.585µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:45 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:45 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c6988713e4cf98f, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client -> Sending packet 2 (43 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e1a1b20dc9a773ab, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:45 client <- Reading packet 3 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c6988713e4cf98f, PacketNumber: 3, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 76.744ms} 2025/04/30 09:12:45 client Peer doesn't await address validation any longer. 2025/04/30 09:12:45 client -> Sending packet 3 (43 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e1a1b20dc9a773ab, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:45 client -> Sending packet 4 (74 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e1a1b20dc9a773ab, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client -> Sending packet 5 (74 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: e1a1b20dc9a773ab, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.NewTokenFrame{Token: 0xf434d65f1679c19ada2d6e72d1b5f53b723d265d846b0f44f079219cbd01725983fb2a44e541b001d9625b6bca2f6d634cea} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e1a1b20dc9a773ab, StatelessResetToken: 0x007e4b8cfd58e5cfedfb0157e02f6002} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 093ad0eaf78d429e, StatelessResetToken: 0xaa5289b93417bcb153fde1782fb65c96} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8157611661e7eac0, StatelessResetToken: 0xdb16e90bc1ae702b4eca287ee659066f} 2025/04/30 09:12:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:45 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:45 client Dropping Handshake keys. 2025/04/30 09:12:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:45 client -> Sending packet 3 (58 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 108.753µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client -> Sending packet 4 (48 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client -> Sending packet 5 (1360 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.PingFrame{} 2025/04/30 09:12:45 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:45 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:45 client -> Sending packet 6 (38 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.217812ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:45 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 6.952ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:45 client newly acked packets (2): [4 5] 2025/04/30 09:12:45 client updated RTT: 38.824758ms (σ: 19.412379ms) 2025/04/30 09:12:45 client ECN capability confirmed. 2025/04/30 09:12:45 client Canceling loss detection timer. 2025/04/30 09:12:45 client <- Reading packet 10 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 89a7b54dda7d238d, StatelessResetToken: 0xa5ee54e4f0b13fff02c44d7187a15efb} 2025/04/30 09:12:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:45 client -> Sending packet 7 (41 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 66.204µs, ECT0: 0, ECT1: 6, CE: 0} 2025/04/30 09:12:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:45 client -> Sending packet 8 (30 bytes) for connection 4da1e9995e5075f965b0f8ba2981c683e7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: e1a1b20dc9a773ab, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:45 client Connection 4da1e9995e5075f965b0f8ba2981c683e7 closed. 2025/04/30 09:12:45 Requesting https://server4:443/lldotgpqup. 2025/04/30 09:12:45 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:45 Increased send buffer size to 14336 kiB 2025/04/30 09:12:45 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:45 Created qlog file: /logs/qlog/2cf69d67d349ed201ead02.sqlog 2025/04/30 09:12:45 client Starting new connection to server4 ([::]:52916 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2cf69d67d349ed201ead02, version v1 2025/04/30 09:12:45 Adding connection ID (empty). 2025/04/30 09:12:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:45 client -> Sending packet 0 (1280 bytes) for connection 2cf69d67d349ed201ead02, Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: 2cf69d67d349ed201ead02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:45 client <- Reading packet 75364 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c92ec8508edf2213, Token: (empty), PacketNumber: 75364, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:45 client Received first packet. Switching destination connection ID to: c92ec8508edf2213 2025/04/30 09:12:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 09:12:45 client newly acked packets (1): [0] 2025/04/30 09:12:45 client updated RTT: 33.088289ms (σ: 16.544144ms) 2025/04/30 09:12:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 369 bytes. 2025/04/30 09:12:45 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c92ec8508edf2213, PacketNumber: 0, PacketNumberLen: 4, Length: 729, Version: v1} 2025/04/30 09:12:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:12:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2cf69d67d349ed201ead02, InitialSourceConnectionID: c92ec8508edf2213, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd84f40f34381dd1be686bb8ace208ea4} 2025/04/30 09:12:45 client Parsed a coalesced packet. Part 3: 369 bytes. Remaining: 0 bytes. 2025/04/30 09:12:45 client <- Reading packet 1 (369 bytes) for connection (empty), Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c92ec8508edf2213, PacketNumber: 1, PacketNumberLen: 4, Length: 352, Version: v1} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2cf69d67d349ed201ead02 2025/04/30 09:12:45 client Long Header{Type: Initial, DestConnectionID: c92ec8508edf2213, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 75364, LowestAcked: 75364, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: c92ec8508edf2213, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:45 client Dropping Initial keys. 2025/04/30 09:12:45 client -> Sending packet 1 (89 bytes) for connection 2cf69d67d349ed201ead02, Handshake 2025/04/30 09:12:45 client Long Header{Type: Handshake, DestConnectionID: c92ec8508edf2213, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:45 client Short Header{DestConnectionID: c92ec8508edf2213, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:45 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:45 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:45 client <- &wire.PingFrame{} 2025/04/30 09:12:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:45 client -> Sending packet 1 (35 bytes) for connection 2cf69d67d349ed201ead02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:45 client Short Header{DestConnectionID: c92ec8508edf2213, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:45 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 58.73µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:46 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 24µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:46 client Peer doesn't await address validation any longer. 2025/04/30 09:12:46 client newly acked packets (1): [0] 2025/04/30 09:12:46 client Canceling loss detection timer. 2025/04/30 09:12:46 client Dropping Handshake keys. 2025/04/30 09:12:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:46 client -> Sending packet 2 (30 bytes) for connection 2cf69d67d349ed201ead02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:46 client Short Header{DestConnectionID: c92ec8508edf2213, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:46 client Connection 2cf69d67d349ed201ead02 closed. 2025/04/30 09:12:46 Requesting https://server4:443/mlyuwmfxzf. 2025/04/30 09:12:46 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:46 Increased send buffer size to 14336 kiB 2025/04/30 09:12:46 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:46 Created qlog file: /logs/qlog/812c42dfcfa60dc91367.sqlog 2025/04/30 09:12:46 client Starting new connection to server4 ([::]:42876 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 812c42dfcfa60dc91367, version v1 2025/04/30 09:12:46 Adding connection ID (empty). 2025/04/30 09:12:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:46 client -> Sending packet 0 (1280 bytes) for connection 812c42dfcfa60dc91367, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 812c42dfcfa60dc91367, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:46 client -> Sending packet 1 (1280 bytes) for connection 812c42dfcfa60dc91367, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 812c42dfcfa60dc91367, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:46 client -> Sending packet 2 (1280 bytes) for connection 812c42dfcfa60dc91367, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 812c42dfcfa60dc91367, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:12:46 client -> Sending packet 3 (1280 bytes) for connection 812c42dfcfa60dc91367, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 812c42dfcfa60dc91367, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:46 client -> Sending packet 4 (1280 bytes) for connection 812c42dfcfa60dc91367, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 812c42dfcfa60dc91367, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:46 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:12:46 client <- Reading packet 76234 (138 bytes) for connection (empty), Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7872d3012859d65d, Token: (empty), PacketNumber: 76234, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:12:46 client Received first packet. Switching destination connection ID to: 7872d3012859d65d 2025/04/30 09:12:46 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 528µs} 2025/04/30 09:12:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:46 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 370 bytes. 2025/04/30 09:12:46 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 09:12:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7872d3012859d65d, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/04/30 09:12:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 812c42dfcfa60dc91367, InitialSourceConnectionID: 7872d3012859d65d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd46832ee801d66ae0c6d0a8399e272cd} 2025/04/30 09:12:46 client Parsed a coalesced packet. Part 3: 370 bytes. Remaining: 0 bytes. 2025/04/30 09:12:46 client <- Reading packet 1 (370 bytes) for connection (empty), Handshake 2025/04/30 09:12:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7872d3012859d65d, PacketNumber: 1, PacketNumberLen: 4, Length: 353, Version: v1} 2025/04/30 09:12:46 client <- &wire.PingFrame{} 2025/04/30 09:12:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 812c42dfcfa60dc91367 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 7872d3012859d65d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:46 client -> &wire.AckFrame{LargestAcked: 76234, LowestAcked: 76234, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:46 client Long Header{Type: Handshake, DestConnectionID: 7872d3012859d65d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:46 client Dropping Initial keys. 2025/04/30 09:12:46 client -> Sending packet 1 (43 bytes) for connection 812c42dfcfa60dc91367, Handshake 2025/04/30 09:12:46 client Long Header{Type: Handshake, DestConnectionID: 7872d3012859d65d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:46 client -> Sending packet 0 (46 bytes) for connection 812c42dfcfa60dc91367, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:46 client Short Header{DestConnectionID: 7872d3012859d65d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:46 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:46 client Dropping Handshake keys. 2025/04/30 09:12:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:46 client -> Sending packet 1 (1360 bytes) for connection 812c42dfcfa60dc91367, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:46 client Short Header{DestConnectionID: 7872d3012859d65d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:46 client -> &wire.PingFrame{} 2025/04/30 09:12:46 client -> Sending packet 2 (35 bytes) for connection 812c42dfcfa60dc91367, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:46 client Short Header{DestConnectionID: 7872d3012859d65d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 143.779µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:46 client -> Sending packet 3 (30 bytes) for connection 812c42dfcfa60dc91367, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:46 client Short Header{DestConnectionID: 7872d3012859d65d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:46 client Connection 812c42dfcfa60dc91367 closed. 2025/04/30 09:12:46 Requesting https://server4:443/penhuzcnbj. 2025/04/30 09:12:46 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:46 Increased send buffer size to 14336 kiB 2025/04/30 09:12:46 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:46 Created qlog file: /logs/qlog/87eb6d8056673d2ac8bd4d.sqlog 2025/04/30 09:12:46 client Starting new connection to server4 ([::]:56629 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 87eb6d8056673d2ac8bd4d, version v1 2025/04/30 09:12:46 Adding connection ID (empty). 2025/04/30 09:12:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:46 client -> Sending packet 0 (1280 bytes) for connection 87eb6d8056673d2ac8bd4d, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 87eb6d8056673d2ac8bd4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:12:46 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:46 client -> Sending packet 1 (1280 bytes) for connection 87eb6d8056673d2ac8bd4d, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 87eb6d8056673d2ac8bd4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:12:46 client -> Sending packet 2 (1280 bytes) for connection 87eb6d8056673d2ac8bd4d, Initial 2025/04/30 09:12:46 client Long Header{Type: Initial, DestConnectionID: 87eb6d8056673d2ac8bd4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:12:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:12:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:47 client <- Reading packet 65572 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5a631e2933ba6e3e, Token: (empty), PacketNumber: 65572, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:47 client Received first packet. Switching destination connection ID to: 5a631e2933ba6e3e 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 250.136ms} 2025/04/30 09:12:47 client newly acked packets (1): [2] 2025/04/30 09:12:47 client updated RTT: 283.842143ms (σ: 141.921071ms) 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:47 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5a631e2933ba6e3e, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client -> Sending packet 3 (1280 bytes) for connection 87eb6d8056673d2ac8bd4d, Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: 5a631e2933ba6e3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 65572, LowestAcked: 65572, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:47 client -> Sending packet 0 (43 bytes) for connection 87eb6d8056673d2ac8bd4d, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 5a631e2933ba6e3e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Dropping Initial keys. 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:47 client <- Reading packet 4 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5a631e2933ba6e3e, PacketNumber: 4, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:12:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 87eb6d8056673d2ac8bd4d, InitialSourceConnectionID: 5a631e2933ba6e3e, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x7e11b16c301acb3d9f05889a6a016374} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:47 client Peer doesn't await address validation any longer. 2025/04/30 09:12:47 client Canceling loss detection timer. 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:47 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5a631e2933ba6e3e, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:47 client -> Sending packet 1 (82 bytes) for connection 87eb6d8056673d2ac8bd4d, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 5a631e2933ba6e3e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:47 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:47 client <- Reading packet 6 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5a631e2933ba6e3e, PacketNumber: 6, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:47 client -> Sending packet 2 (89 bytes) for connection 87eb6d8056673d2ac8bd4d, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 5a631e2933ba6e3e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:47 client Short Header{DestConnectionID: 5a631e2933ba6e3e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 client -> Sending packet 1 (38 bytes) for connection 87eb6d8056673d2ac8bd4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 5a631e2933ba6e3e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 482.4359ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:47 client newly acked packets (1): [0] 2025/04/30 09:12:47 client Canceling loss detection timer. 2025/04/30 09:12:47 client Dropping Handshake keys. 2025/04/30 09:12:47 client <- &wire.NewTokenFrame{Token: 0xcc59b2e845224bedadb1f6a44b2a714a4fbd85fd58cd88cd34721ba2d9aeca0e514a312adfcb3d6c5447b454f3abacc0695d} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d6316a7454962396, StatelessResetToken: 0x76c11d53e4d8d7464b689bd360f734de} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf86a3ddbe76027b, StatelessResetToken: 0xfa439ae1757921ff06e574a00a74cd5e} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3e4425e12cd34125, StatelessResetToken: 0x174750e32c3fbadb55fc3c53cd138937} 2025/04/30 09:12:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client -> Sending packet 2 (37 bytes) for connection 87eb6d8056673d2ac8bd4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: d6316a7454962396, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 126.416µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:47 client -> Sending packet 3 (30 bytes) for connection 87eb6d8056673d2ac8bd4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: d6316a7454962396, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:47 client Connection 87eb6d8056673d2ac8bd4d closed. 2025/04/30 09:12:47 Requesting https://server4:443/thecnnqmsw. 2025/04/30 09:12:47 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:47 Increased send buffer size to 14336 kiB 2025/04/30 09:12:47 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:47 Created qlog file: /logs/qlog/efac32d31262ebae2d590c84cb7c90649fbf.sqlog 2025/04/30 09:12:47 client Starting new connection to server4 ([::]:60085 -> 193.167.100.100:443), source connection ID (empty), destination connection ID efac32d31262ebae2d590c84cb7c90649fbf, version v1 2025/04/30 09:12:47 Adding connection ID (empty). 2025/04/30 09:12:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:47 client -> Sending packet 0 (1280 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: efac32d31262ebae2d590c84cb7c90649fbf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:47 client <- Reading packet 105972 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7ae44b60131dd8a6, Token: (empty), PacketNumber: 105972, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:47 client Received first packet. Switching destination connection ID to: 7ae44b60131dd8a6 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 09:12:47 client newly acked packets (1): [0] 2025/04/30 09:12:47 client updated RTT: 32.989515ms (σ: 16.494757ms) 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 362 bytes. 2025/04/30 09:12:47 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7ae44b60131dd8a6, PacketNumber: 0, PacketNumberLen: 4, Length: 736, Version: v1} 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 09:12:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: efac32d31262ebae2d590c84cb7c90649fbf, InitialSourceConnectionID: 7ae44b60131dd8a6, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x29fc05ed04f2b52ce37aee9fefd51a2a} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 3: 362 bytes. Remaining: 0 bytes. 2025/04/30 09:12:47 client <- Reading packet 1 (362 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7ae44b60131dd8a6, PacketNumber: 1, PacketNumberLen: 4, Length: 345, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: 7ae44b60131dd8a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 105972, LowestAcked: 105972, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 7ae44b60131dd8a6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:47 client Dropping Initial keys. 2025/04/30 09:12:47 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.NewTokenFrame{Token: 0xf8f4180809e25a0dc0143fc49e704ab05ff02769d5444697c8f6d521165ce390e5383f3b9a7b7ae45fc0a9763adff43bb42b} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 80b60afd84acbb92, StatelessResetToken: 0x2b3b7a9ee6309d8cfe4be5f588865698} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcd1f01845bb939c, StatelessResetToken: 0xbc3c7a1643c2bfcc6ee77c7745edccdb} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4dd6eeb84f97293d, StatelessResetToken: 0xc91b63cb2c58c5fc826ad5e961013c55} 2025/04/30 09:12:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:47 client -> Sending packet 1 (91 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 80b60afd84acbb92, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 client -> Sending packet 1 (36 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 573.108µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:47 client -> Sending packet 2 (36 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.230803ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 2 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:47 client Dropping Handshake keys. 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:47 client -> Sending packet 3 (36 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.27779ms, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:47 client -> Sending packet 5 (48 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 client -> Sending packet 6 (48 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:47 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 75.808ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client <- Reading packet 4 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:47 client -> Sending packet 7 (35 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 87.032µs, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 5 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 88µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:47 client newly acked packets (1): [6] 2025/04/30 09:12:47 client updated RTT: 32.713ms (σ: 12.92ms) 2025/04/30 09:12:47 client ECN capability confirmed. 2025/04/30 09:12:47 client Canceling loss detection timer. 2025/04/30 09:12:47 client <- Reading packet 6 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 201.064ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client -> Sending packet 8 (1360 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.PingFrame{} 2025/04/30 09:12:47 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:47 client -> Sending packet 9 (36 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 25.314521ms, ECT0: 0, ECT1: 7, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 8 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 525f2d599ce89c41, StatelessResetToken: 0x032609cfd2a3116efb6fb1a8e3bdea0a} 2025/04/30 09:12:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:47 client -> Sending packet 10 (37 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 0}}, DelayTime: 80.887µs, ECT0: 0, ECT1: 8, CE: 0} 2025/04/30 09:12:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:47 client -> Sending packet 11 (30 bytes) for connection efac32d31262ebae2d590c84cb7c90649fbf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 80b60afd84acbb92, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:47 client Connection efac32d31262ebae2d590c84cb7c90649fbf closed. 2025/04/30 09:12:47 Requesting https://server4:443/zisechoswj. 2025/04/30 09:12:47 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:47 Increased send buffer size to 14336 kiB 2025/04/30 09:12:47 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:47 Created qlog file: /logs/qlog/38e208f0802fc7d2c21366b73ccf0f268d6ba8.sqlog 2025/04/30 09:12:47 client Starting new connection to server4 ([::]:58287 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 38e208f0802fc7d2c21366b73ccf0f268d6ba8, version v1 2025/04/30 09:12:47 Adding connection ID (empty). 2025/04/30 09:12:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:47 client -> Sending packet 0 (1280 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8, Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: 38e208f0802fc7d2c21366b73ccf0f268d6ba8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:47 client <- Reading packet 88834 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d38461388259040, Token: (empty), PacketNumber: 88834, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:47 client Received first packet. Switching destination connection ID to: 8d38461388259040 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 09:12:47 client newly acked packets (1): [0] 2025/04/30 09:12:47 client updated RTT: 33.083305ms (σ: 16.541652ms) 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 2: 754 bytes. Remaining: 361 bytes. 2025/04/30 09:12:47 client <- Reading packet 0 (754 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d38461388259040, PacketNumber: 0, PacketNumberLen: 4, Length: 737, Version: v1} 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:12:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 38e208f0802fc7d2c21366b73ccf0f268d6ba8, InitialSourceConnectionID: 8d38461388259040, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x77d2afa8d1b4c4342fcc4b705a162022} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 3: 361 bytes. Remaining: 0 bytes. 2025/04/30 09:12:47 client <- Reading packet 1 (361 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d38461388259040, PacketNumber: 1, PacketNumberLen: 4, Length: 344, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: 8d38461388259040, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 88834, LowestAcked: 88834, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 8d38461388259040, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:47 client Dropping Initial keys. 2025/04/30 09:12:47 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.NewTokenFrame{Token: 0xb1e6da892e2612b1a96b9ce8700c8b7d3e6a430298f8d257c9bfa5de445be0dab4a0251e108d9091b6d4868eedc3cb4054d7} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 47303d9d77864681, StatelessResetToken: 0x41023cb31bc5fde7b27a2faecc77dd26} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0c230454ddea98fd, StatelessResetToken: 0x5997e67ff006b778d19a0931f5e041b9} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 769f4f5f1c2d2266, StatelessResetToken: 0xbcebdb801cd3ead5acc9ea786270b84e} 2025/04/30 09:12:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:47 client -> Sending packet 1 (91 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: 47303d9d77864681, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client Short Header{DestConnectionID: 47303d9d77864681, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 client -> Sending packet 1 (35 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 47303d9d77864681, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 463.31µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:47 client -> Sending packet 2 (36 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 47303d9d77864681, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.240199ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f582e5cd3857eb08, StatelessResetToken: 0x339598eeb0eab184a4fa7cf140a1d575} 2025/04/30 09:12:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:47 client Dropping Handshake keys. 2025/04/30 09:12:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:47 client -> Sending packet 3 (37 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 47303d9d77864681, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 86.118µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:47 client -> Sending packet 4 (30 bytes) for connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: 47303d9d77864681, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:47 client Connection 38e208f0802fc7d2c21366b73ccf0f268d6ba8 closed. 2025/04/30 09:12:47 Requesting https://server4:443/wewizucvmy. 2025/04/30 09:12:47 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:47 Increased send buffer size to 14336 kiB 2025/04/30 09:12:47 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:47 Created qlog file: /logs/qlog/781e87aa1f28a004baf156b94756.sqlog 2025/04/30 09:12:47 client Starting new connection to server4 ([::]:42334 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 781e87aa1f28a004baf156b94756, version v1 2025/04/30 09:12:47 Adding connection ID (empty). 2025/04/30 09:12:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:47 client -> Sending packet 0 (1280 bytes) for connection 781e87aa1f28a004baf156b94756, Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: 781e87aa1f28a004baf156b94756, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:47 client <- Reading packet 130194 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f89cfd13a7281da6, Token: (empty), PacketNumber: 130194, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:47 client Received first packet. Switching destination connection ID to: f89cfd13a7281da6 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 448µs} 2025/04/30 09:12:47 client newly acked packets (1): [0] 2025/04/30 09:12:47 client updated RTT: 33.022692ms (σ: 16.511346ms) 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 366 bytes. 2025/04/30 09:12:47 client <- Reading packet 0 (749 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f89cfd13a7281da6, PacketNumber: 0, PacketNumberLen: 4, Length: 732, Version: v1} 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:12:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 781e87aa1f28a004baf156b94756, InitialSourceConnectionID: f89cfd13a7281da6, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xd1a3c049659a3d7e63d85bbe1e2b6c4e} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 3: 366 bytes. Remaining: 0 bytes. 2025/04/30 09:12:47 client <- Reading packet 1 (366 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f89cfd13a7281da6, PacketNumber: 1, PacketNumberLen: 4, Length: 349, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 781e87aa1f28a004baf156b94756 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: f89cfd13a7281da6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 130194, LowestAcked: 130194, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: f89cfd13a7281da6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:47 client Dropping Initial keys. 2025/04/30 09:12:47 client -> Sending packet 1 (43 bytes) for connection 781e87aa1f28a004baf156b94756, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: f89cfd13a7281da6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client -> Sending packet 0 (46 bytes) for connection 781e87aa1f28a004baf156b94756, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: f89cfd13a7281da6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:47 client -> Sending packet 1 (35 bytes) for connection 781e87aa1f28a004baf156b94756, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: f89cfd13a7281da6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 64.674µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 72µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:47 client Peer doesn't await address validation any longer. 2025/04/30 09:12:47 client newly acked packets (1): [0] 2025/04/30 09:12:47 client updated RTT: 32.977ms (σ: 12.471ms) 2025/04/30 09:12:47 client ECN capability confirmed. 2025/04/30 09:12:47 client Canceling loss detection timer. 2025/04/30 09:12:47 client Dropping Handshake keys. 2025/04/30 09:12:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:47 client -> Sending packet 2 (30 bytes) for connection 781e87aa1f28a004baf156b94756, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: f89cfd13a7281da6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:47 client Connection 781e87aa1f28a004baf156b94756 closed. 2025/04/30 09:12:47 Requesting https://server4:443/ndmrfrxqdw. 2025/04/30 09:12:47 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:47 Increased send buffer size to 14336 kiB 2025/04/30 09:12:47 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:47 Created qlog file: /logs/qlog/3ce8e2a8e9252abd.sqlog 2025/04/30 09:12:47 client Starting new connection to server4 ([::]:38778 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ce8e2a8e9252abd, version v1 2025/04/30 09:12:47 Adding connection ID (empty). 2025/04/30 09:12:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:47 client -> Sending packet 0 (1280 bytes) for connection 3ce8e2a8e9252abd, Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: 3ce8e2a8e9252abd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:47 client <- Reading packet 81551 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e63cd886875ef481, Token: (empty), PacketNumber: 81551, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:47 client Received first packet. Switching destination connection ID to: e63cd886875ef481 2025/04/30 09:12:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 09:12:47 client newly acked packets (1): [0] 2025/04/30 09:12:47 client updated RTT: 32.982737ms (σ: 16.491368ms) 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 371 bytes. 2025/04/30 09:12:47 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e63cd886875ef481, PacketNumber: 0, PacketNumberLen: 4, Length: 727, Version: v1} 2025/04/30 09:12:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:12:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ce8e2a8e9252abd, InitialSourceConnectionID: e63cd886875ef481, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0xdb1665ddf7e9e8830ce6f8841564b1a6} 2025/04/30 09:12:47 client Parsed a coalesced packet. Part 3: 371 bytes. Remaining: 0 bytes. 2025/04/30 09:12:47 client <- Reading packet 1 (371 bytes) for connection (empty), Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e63cd886875ef481, PacketNumber: 1, PacketNumberLen: 4, Length: 354, Version: v1} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ce8e2a8e9252abd 2025/04/30 09:12:47 client Long Header{Type: Initial, DestConnectionID: e63cd886875ef481, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 81551, LowestAcked: 81551, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: e63cd886875ef481, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:47 client Dropping Initial keys. 2025/04/30 09:12:47 client -> Sending packet 1 (89 bytes) for connection 3ce8e2a8e9252abd, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: e63cd886875ef481, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:47 client Short Header{DestConnectionID: e63cd886875ef481, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:47 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:47 client <- &wire.PingFrame{} 2025/04/30 09:12:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:47 client -> Sending packet 1 (35 bytes) for connection 3ce8e2a8e9252abd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:47 client Short Header{DestConnectionID: e63cd886875ef481, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 64.212µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:47 client -> Sending packet 2 (74 bytes) for connection 3ce8e2a8e9252abd, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: e63cd886875ef481, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:47 client -> Sending packet 3 (74 bytes) for connection 3ce8e2a8e9252abd, Handshake 2025/04/30 09:12:47 client Long Header{Type: Handshake, DestConnectionID: e63cd886875ef481, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.NewTokenFrame{Token: 0xf85feac7b2784728ee5a1d52800feb3d3e1cdc9a872c55c6b779b4379d48d89d170c93fb1c4c56a82b1186560320c4980acb} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b0a649030bbbbdf9, StatelessResetToken: 0xdcbde095b33fc69adbe2540dcb8f4973} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7edee9930f9263bb, StatelessResetToken: 0x42c3c3425ce61e98dcca2df06c4c1bcc} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0a8195d328466347, StatelessResetToken: 0x5c3a489dc20a04eaa3bb0f74f6498adf} 2025/04/30 09:12:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 98.104ms} 2025/04/30 09:12:48 client Peer doesn't await address validation any longer. 2025/04/30 09:12:48 client newly acked packets (1): [0] 2025/04/30 09:12:48 client updated RTT: 43.865ms (σ: 34.134ms) 2025/04/30 09:12:48 client Canceling loss detection timer. 2025/04/30 09:12:48 client Dropping Handshake keys. 2025/04/30 09:12:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:48 client -> Sending packet 2 (37 bytes) for connection 3ce8e2a8e9252abd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: b0a649030bbbbdf9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 153.157µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:48 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:48 client -> Sending packet 3 (30 bytes) for connection 3ce8e2a8e9252abd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: b0a649030bbbbdf9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:48 client Connection 3ce8e2a8e9252abd closed. 2025/04/30 09:12:48 Requesting https://server4:443/vdinvlvtbs. 2025/04/30 09:12:48 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:48 Increased send buffer size to 14336 kiB 2025/04/30 09:12:48 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:48 Created qlog file: /logs/qlog/b1b3be72bdf772b7.sqlog 2025/04/30 09:12:48 client Starting new connection to server4 ([::]:34179 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b1b3be72bdf772b7, version v1 2025/04/30 09:12:48 Adding connection ID (empty). 2025/04/30 09:12:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:48 client -> Sending packet 0 (1280 bytes) for connection b1b3be72bdf772b7, Initial 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: b1b3be72bdf772b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:48 client <- Reading packet 104656 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1816d30088723bf4, Token: (empty), PacketNumber: 104656, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:48 client Received first packet. Switching destination connection ID to: 1816d30088723bf4 2025/04/30 09:12:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 09:12:48 client newly acked packets (1): [0] 2025/04/30 09:12:48 client updated RTT: 32.945482ms (σ: 16.472741ms) 2025/04/30 09:12:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 372 bytes. 2025/04/30 09:12:48 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1816d30088723bf4, PacketNumber: 0, PacketNumberLen: 4, Length: 726, Version: v1} 2025/04/30 09:12:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b1b3be72bdf772b7, InitialSourceConnectionID: 1816d30088723bf4, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x5e6537a7f7758fab1c04eaacc03dc74c} 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 3: 372 bytes. Remaining: 0 bytes. 2025/04/30 09:12:48 client <- Reading packet 1 (372 bytes) for connection (empty), Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1816d30088723bf4, PacketNumber: 1, PacketNumberLen: 4, Length: 355, Version: v1} 2025/04/30 09:12:48 client <- &wire.PingFrame{} 2025/04/30 09:12:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b1b3be72bdf772b7 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: 1816d30088723bf4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 104656, LowestAcked: 104656, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 1816d30088723bf4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 client Dropping Initial keys. 2025/04/30 09:12:48 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.NewTokenFrame{Token: 0xe99bec4802efbadcc335b831b7c799915038905b71e920a99ea05e3585fc0e66c84c37cc2279fdc091be33fa28a5725afcfd} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 851a8deac652b23e, StatelessResetToken: 0x189cd4cd67c4dffdbc92c798f594c0ec} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aab4f77ccdf62285, StatelessResetToken: 0x877671d946bd18c5b1e7dbd6f7498028} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: de49103ae26afb8b, StatelessResetToken: 0xb118cfe0a146387cd730114b515407d7} 2025/04/30 09:12:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:48 client -> Sending packet 1 (91 bytes) for connection b1b3be72bdf772b7, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 851a8deac652b23e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:48 client Short Header{DestConnectionID: 851a8deac652b23e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:48 client -> Sending packet 1 (35 bytes) for connection b1b3be72bdf772b7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 851a8deac652b23e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 488.692µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:48 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.PingFrame{} 2025/04/30 09:12:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:48 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:48 client -> Sending packet 2 (36 bytes) for connection b1b3be72bdf772b7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 851a8deac652b23e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.226949ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:48 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 24µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:48 client Peer doesn't await address validation any longer. 2025/04/30 09:12:48 client newly acked packets (1): [0] 2025/04/30 09:12:48 client Canceling loss detection timer. 2025/04/30 09:12:48 client Dropping Handshake keys. 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0452049eb0e5cd3e, StatelessResetToken: 0xd89665d596b71bb5154037c92466f0eb} 2025/04/30 09:12:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:48 client -> Sending packet 3 (30 bytes) for connection b1b3be72bdf772b7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 851a8deac652b23e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:48 client Connection b1b3be72bdf772b7 closed. 2025/04/30 09:12:48 Requesting https://server4:443/spucelzgmd. 2025/04/30 09:12:48 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:48 Increased send buffer size to 14336 kiB 2025/04/30 09:12:48 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:48 Created qlog file: /logs/qlog/fb90262e87fffdfbc64b060b42.sqlog 2025/04/30 09:12:48 client Starting new connection to server4 ([::]:49629 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fb90262e87fffdfbc64b060b42, version v1 2025/04/30 09:12:48 Adding connection ID (empty). 2025/04/30 09:12:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:48 client -> Sending packet 0 (1280 bytes) for connection fb90262e87fffdfbc64b060b42, Initial 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: fb90262e87fffdfbc64b060b42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:48 client -> Sending packet 1 (1280 bytes) for connection fb90262e87fffdfbc64b060b42, Initial 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: fb90262e87fffdfbc64b060b42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:48 client -> Sending packet 2 (1280 bytes) for connection fb90262e87fffdfbc64b060b42, Initial 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: fb90262e87fffdfbc64b060b42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 09:12:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:12:48 client <- Reading packet 129585 (138 bytes) for connection (empty), Initial 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9eab36e4e7800b6d, Token: (empty), PacketNumber: 129585, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:12:48 client Received first packet. Switching destination connection ID to: 9eab36e4e7800b6d 2025/04/30 09:12:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 664µs} 2025/04/30 09:12:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 366 bytes. 2025/04/30 09:12:48 client <- Reading packet 0 (748 bytes) for connection (empty), Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eab36e4e7800b6d, PacketNumber: 0, PacketNumberLen: 4, Length: 731, Version: v1} 2025/04/30 09:12:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 09:12:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fb90262e87fffdfbc64b060b42, InitialSourceConnectionID: 9eab36e4e7800b6d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x02d541b5e30c6aae50b3a2a69be4a4a6} 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 3: 366 bytes. Remaining: 0 bytes. 2025/04/30 09:12:48 client <- Reading packet 1 (366 bytes) for connection (empty), Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eab36e4e7800b6d, PacketNumber: 1, PacketNumberLen: 4, Length: 349, Version: v1} 2025/04/30 09:12:48 client <- &wire.PingFrame{} 2025/04/30 09:12:48 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.NewTokenFrame{Token: 0xffb638609abc5eaf8cfdb399b135ac2760ad7dd45120c5402454d09b37b31fdd9caaeba03fdfb5dfafb884f6a5eaaccc80f5} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01f8609b37d4a3c8, StatelessResetToken: 0x84910eec5e9df1edaba4e6cace906338} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d20ccc51413a7b5c, StatelessResetToken: 0xf6f4509ccb1ee5555d7e652176570e1a} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d30b721970c56a03, StatelessResetToken: 0x9649321cb5133d99bd4f4701fadf34eb} 2025/04/30 09:12:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fb90262e87fffdfbc64b060b42 2025/04/30 09:12:48 client Long Header{Type: Initial, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 129585, LowestAcked: 129585, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:48 client Dropping Initial keys. 2025/04/30 09:12:48 client -> Sending packet 1 (43 bytes) for connection fb90262e87fffdfbc64b060b42, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:48 client -> Sending packet 1 (36 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.080112ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:48 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:12:48 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:48 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eab36e4e7800b6d, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:48 client <- &wire.PingFrame{} 2025/04/30 09:12:48 client -> Sending packet 2 (43 bytes) for connection fb90262e87fffdfbc64b060b42, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:48 client -> Sending packet 3 (74 bytes) for connection fb90262e87fffdfbc64b060b42, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 client -> Sending packet 4 (74 bytes) for connection fb90262e87fffdfbc64b060b42, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:12:48 client -> Sending packet 5 (74 bytes) for connection fb90262e87fffdfbc64b060b42, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 client -> Sending packet 6 (74 bytes) for connection fb90262e87fffdfbc64b060b42, Handshake 2025/04/30 09:12:48 client Long Header{Type: Handshake, DestConnectionID: 01f8609b37d4a3c8, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:48 client <- Reading packet 2 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.NewTokenFrame{Token: 0xffb638609abc5eaf8cfdb399b135ac2760ad7dd45120c5402454d09b37b31fdd9caaeba03fdfb5dfafb884f6a5eaaccc80f5} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01f8609b37d4a3c8, StatelessResetToken: 0x84910eec5e9df1edaba4e6cace906338} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d20ccc51413a7b5c, StatelessResetToken: 0xf6f4509ccb1ee5555d7e652176570e1a} 2025/04/30 09:12:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d30b721970c56a03, StatelessResetToken: 0x9649321cb5133d99bd4f4701fadf34eb} 2025/04/30 09:12:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:48 client <- Reading packet 3 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:48 client Dropping Handshake keys. 2025/04/30 09:12:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:48 client -> Sending packet 3 (58 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 112.01µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:48 client -> Sending packet 4 (48 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:48 client -> Sending packet 5 (1360 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:48 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:48 client -> &wire.PingFrame{} 2025/04/30 09:12:48 client <- Reading packet 5 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:48 client newly acked packets (1): [4] 2025/04/30 09:12:48 client updated RTT: 30.749361ms (σ: 15.37468ms) 2025/04/30 09:12:48 client ECN capability confirmed. 2025/04/30 09:12:48 client Canceling loss detection timer. 2025/04/30 09:12:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:49 client <- Reading packet 6 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.NewTokenFrame{Token: 0xffb638609abc5eaf8cfdb399b135ac2760ad7dd45120c5402454d09b37b31fdd9caaeba03fdfb5dfafb884f6a5eaaccc80f5} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01f8609b37d4a3c8, StatelessResetToken: 0x84910eec5e9df1edaba4e6cace906338} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d20ccc51413a7b5c, StatelessResetToken: 0xf6f4509ccb1ee5555d7e652176570e1a} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d30b721970c56a03, StatelessResetToken: 0x9649321cb5133d99bd4f4701fadf34eb} 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 197.664ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:49 client <- Reading packet 8 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.PingFrame{} 2025/04/30 09:12:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:49 client -> Sending packet 6 (41 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 62.83µs, ECT0: 0, ECT1: 6, CE: 0} 2025/04/30 09:12:49 client <- Reading packet 9 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e21b81c064835066, StatelessResetToken: 0xfb1acc558bd2ca8533fe46f49c5a817e} 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 30.912ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:49 client <- Reading packet 10 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 09:12:49 client -> Sending packet 7 (41 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 73.201µs, ECT0: 0, ECT1: 8, CE: 0} 2025/04/30 09:12:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:49 client -> Sending packet 8 (30 bytes) for connection fb90262e87fffdfbc64b060b42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 01f8609b37d4a3c8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:49 client Connection fb90262e87fffdfbc64b060b42 closed. 2025/04/30 09:12:49 Requesting https://server4:443/xqwjkgozny. 2025/04/30 09:12:49 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:49 Increased send buffer size to 14336 kiB 2025/04/30 09:12:49 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:49 Created qlog file: /logs/qlog/46e2f3d463329e3a9a.sqlog 2025/04/30 09:12:49 client Starting new connection to server4 ([::]:34099 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 46e2f3d463329e3a9a, version v1 2025/04/30 09:12:49 Adding connection ID (empty). 2025/04/30 09:12:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:49 client -> Sending packet 0 (1280 bytes) for connection 46e2f3d463329e3a9a, Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: 46e2f3d463329e3a9a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 09:12:49 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:12:49 client <- Reading packet 93172 (138 bytes) for connection (empty), Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: debf63c4510ad64b, Token: (empty), PacketNumber: 93172, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:12:49 client Received first packet. Switching destination connection ID to: debf63c4510ad64b 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 536µs} 2025/04/30 09:12:49 client newly acked packets (1): [0] 2025/04/30 09:12:49 client updated RTT: 33.171367ms (σ: 16.585683ms) 2025/04/30 09:12:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Parsed a coalesced packet. Part 2: 745 bytes. Remaining: 369 bytes. 2025/04/30 09:12:49 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: debf63c4510ad64b, PacketNumber: 0, PacketNumberLen: 4, Length: 728, Version: v1} 2025/04/30 09:12:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:12:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 46e2f3d463329e3a9a, InitialSourceConnectionID: debf63c4510ad64b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x2286d22a719c362f4409156359c54332} 2025/04/30 09:12:49 client Parsed a coalesced packet. Part 3: 369 bytes. Remaining: 0 bytes. 2025/04/30 09:12:49 client <- Reading packet 1 (369 bytes) for connection (empty), Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: debf63c4510ad64b, PacketNumber: 1, PacketNumberLen: 4, Length: 352, Version: v1} 2025/04/30 09:12:49 client <- &wire.PingFrame{} 2025/04/30 09:12:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 46e2f3d463329e3a9a 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: debf63c4510ad64b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 93172, LowestAcked: 93172, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: debf63c4510ad64b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:49 client Dropping Initial keys. 2025/04/30 09:12:49 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.NewTokenFrame{Token: 0xc353ca0e204d231e150b96a40efc40b1faeeccea06ccde59b9f8f1cfe03627521d4c7fb556c14bf28b5efc031632bd8e71a7} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 493ec3a69212fbe3, StatelessResetToken: 0x6ebc858575d51ef1c80ccdf4cf1b93a8} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1337756ab0cac689, StatelessResetToken: 0xda540f07d44ee18aa2b39b2c125c8901} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 38209b1d72812075, StatelessResetToken: 0xc6dd35cca600840c40a67c54f1508593} 2025/04/30 09:12:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:49 client -> Sending packet 1 (91 bytes) for connection 46e2f3d463329e3a9a, Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: 493ec3a69212fbe3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:49 client Short Header{DestConnectionID: 493ec3a69212fbe3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:49 client -> Sending packet 1 (36 bytes) for connection 46e2f3d463329e3a9a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 493ec3a69212fbe3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.255107ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:49 client <- Reading packet 3 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 33effc03d0c03d2c, StatelessResetToken: 0xc27e5d39c5f0bec1771ecd0c32fe386c} 2025/04/30 09:12:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:49 client Dropping Handshake keys. 2025/04/30 09:12:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:49 client -> Sending packet 2 (37 bytes) for connection 46e2f3d463329e3a9a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 493ec3a69212fbe3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 126.631µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:49 client -> Sending packet 3 (30 bytes) for connection 46e2f3d463329e3a9a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 493ec3a69212fbe3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:49 client Connection 46e2f3d463329e3a9a closed. 2025/04/30 09:12:49 Requesting https://server4:443/oamnpumlli. 2025/04/30 09:12:49 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:49 Increased send buffer size to 14336 kiB 2025/04/30 09:12:49 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:49 Created qlog file: /logs/qlog/d93fd5763291ab31a76a.sqlog 2025/04/30 09:12:49 client Starting new connection to server4 ([::]:53527 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d93fd5763291ab31a76a, version v1 2025/04/30 09:12:49 Adding connection ID (empty). 2025/04/30 09:12:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:49 client -> Sending packet 0 (1280 bytes) for connection d93fd5763291ab31a76a, Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: d93fd5763291ab31a76a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:12:49 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:49 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:49 client -> Sending packet 1 (1280 bytes) for connection d93fd5763291ab31a76a, Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: d93fd5763291ab31a76a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:12:49 client -> Sending packet 2 (1280 bytes) for connection d93fd5763291ab31a76a, Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: d93fd5763291ab31a76a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:12:49 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:49 client <- Reading packet 67325 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: adf01702d15f3dbe, Token: (empty), PacketNumber: 67325, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:49 client Received first packet. Switching destination connection ID to: adf01702d15f3dbe 2025/04/30 09:12:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs} 2025/04/30 09:12:49 client newly acked packets (1): [2] 2025/04/30 09:12:49 client updated RTT: 33.989028ms (σ: 16.994514ms) 2025/04/30 09:12:49 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:49 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf01702d15f3dbe, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:49 client <- &wire.PingFrame{} 2025/04/30 09:12:49 client -> Sending packet 3 (1280 bytes) for connection d93fd5763291ab31a76a, Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: adf01702d15f3dbe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 67325, LowestAcked: 67325, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:49 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:49 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:49 client -> Sending packet 0 (43 bytes) for connection d93fd5763291ab31a76a, Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: adf01702d15f3dbe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:49 client Dropping Initial keys. 2025/04/30 09:12:49 client -> Sending packet 1 (37 bytes) for connection d93fd5763291ab31a76a, Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: adf01702d15f3dbe, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 09:12:49 client -> &wire.PingFrame{} 2025/04/30 09:12:49 client <- Reading packet 4 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf01702d15f3dbe, PacketNumber: 4, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 48µs} 2025/04/30 09:12:49 client Peer doesn't await address validation any longer. 2025/04/30 09:12:49 client newly acked packets (1): [1] 2025/04/30 09:12:49 client updated RTT: 33.584ms (σ: 13.555ms) 2025/04/30 09:12:49 client Canceling loss detection timer. 2025/04/30 09:12:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:49 client <- Reading packet 5 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf01702d15f3dbe, PacketNumber: 5, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:12:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d93fd5763291ab31a76a, InitialSourceConnectionID: adf01702d15f3dbe, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1e874cb50e48b7e372b754dca90fa95a} 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 250.136ms} 2025/04/30 09:12:49 client -> Sending packet 2 (82 bytes) for connection d93fd5763291ab31a76a, Handshake 2025/04/30 09:12:49 client Long Header{Type: Handshake, DestConnectionID: adf01702d15f3dbe, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:49 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.NewTokenFrame{Token: 0xe1efa1fc104627fd153e0d54f84a4347ed0eb57c8b5883b2e098e78aa762dfd0827ce231ecc33e258bc9fba80f763d9293f9} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c6db2fa0619b7c6, StatelessResetToken: 0xeef73f3ca6af2c9c1c42d573d7299d1d} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0a2b3db69593b48f, StatelessResetToken: 0xaae216a3f08a7d82a010f63406df1866} 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eae8945d612c4a63, StatelessResetToken: 0x754bb0eaba2c9abcb81eb01b76e763b3} 2025/04/30 09:12:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:49 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.PingFrame{} 2025/04/30 09:12:49 client -> Sending packet 0 (59 bytes) for connection d93fd5763291ab31a76a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 6c6db2fa0619b7c6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 585.299453ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:49 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:49 client newly acked packets (1): [0] 2025/04/30 09:12:49 client updated RTT: 33.342ms (σ: 10.649ms) 2025/04/30 09:12:49 client ECN capability confirmed. 2025/04/30 09:12:49 client Canceling loss detection timer. 2025/04/30 09:12:49 client Dropping Handshake keys. 2025/04/30 09:12:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6774eb950f6fd8aa, StatelessResetToken: 0x880e9d19713a02107d8cf95d59dba4ac} 2025/04/30 09:12:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:49 client Ignoring all packets below 2. 2025/04/30 09:12:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:49 client -> Sending packet 1 (30 bytes) for connection d93fd5763291ab31a76a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:49 client Short Header{DestConnectionID: 6c6db2fa0619b7c6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:49 client Connection d93fd5763291ab31a76a closed. 2025/04/30 09:12:49 Requesting https://server4:443/rclwqrbbdd. 2025/04/30 09:12:49 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:49 Increased send buffer size to 14336 kiB 2025/04/30 09:12:49 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:49 Created qlog file: /logs/qlog/affd4044aa3485c4cf.sqlog 2025/04/30 09:12:49 client Starting new connection to server4 ([::]:41874 -> 193.167.100.100:443), source connection ID (empty), destination connection ID affd4044aa3485c4cf, version v1 2025/04/30 09:12:49 Adding connection ID (empty). 2025/04/30 09:12:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:49 client -> Sending packet 0 (1280 bytes) for connection affd4044aa3485c4cf, Initial 2025/04/30 09:12:49 client Long Header{Type: Initial, DestConnectionID: affd4044aa3485c4cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:12:49 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:50 client -> Sending packet 1 (1280 bytes) for connection affd4044aa3485c4cf, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: affd4044aa3485c4cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:12:50 client -> Sending packet 2 (1280 bytes) for connection affd4044aa3485c4cf, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: affd4044aa3485c4cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:50 client <- Reading packet 104430 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dab95d814b84a1b8, Token: (empty), PacketNumber: 104430, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:50 client Received first packet. Switching destination connection ID to: dab95d814b84a1b8 2025/04/30 09:12:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:50 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dab95d814b84a1b8, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client -> Sending packet 3 (1280 bytes) for connection affd4044aa3485c4cf, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: dab95d814b84a1b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 104430, LowestAcked: 104430, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client Queueing packet (1452 bytes) for later decryption 2025/04/30 09:12:50 client -> Sending packet 0 (43 bytes) for connection affd4044aa3485c4cf, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: dab95d814b84a1b8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client Dropping Initial keys. 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:50 client <- Reading packet 4 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dab95d814b84a1b8, PacketNumber: 4, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:12:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: affd4044aa3485c4cf, InitialSourceConnectionID: dab95d814b84a1b8, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x738f30671b7097f0d48b6f1f67d7b0d0} 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:50 client Peer doesn't await address validation any longer. 2025/04/30 09:12:50 client Canceling loss detection timer. 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:50 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dab95d814b84a1b8, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:50 client -> Sending packet 1 (130 bytes) for connection affd4044aa3485c4cf, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: dab95d814b84a1b8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client Short Header{DestConnectionID: dab95d814b84a1b8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:50 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:50 client -> Sending packet 1 (38 bytes) for connection affd4044aa3485c4cf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: dab95d814b84a1b8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 232.719039ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client <- Reading packet 2 (1079 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:50 client newly acked packets (1): [0] 2025/04/30 09:12:50 client Canceling loss detection timer. 2025/04/30 09:12:50 client Dropping Handshake keys. 2025/04/30 09:12:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:50 client -> Sending packet 2 (1360 bytes) for connection affd4044aa3485c4cf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: dab95d814b84a1b8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.PingFrame{} 2025/04/30 09:12:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:50 client -> Sending packet 3 (30 bytes) for connection affd4044aa3485c4cf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: dab95d814b84a1b8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:50 client Connection affd4044aa3485c4cf closed. 2025/04/30 09:12:50 Requesting https://server4:443/hnrftnebfr. 2025/04/30 09:12:50 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:50 Increased send buffer size to 14336 kiB 2025/04/30 09:12:50 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:50 Created qlog file: /logs/qlog/b172499342414916c8b581da3a2a.sqlog 2025/04/30 09:12:50 client Starting new connection to server4 ([::]:53005 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b172499342414916c8b581da3a2a, version v1 2025/04/30 09:12:50 Adding connection ID (empty). 2025/04/30 09:12:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:50 client -> Sending packet 0 (1280 bytes) for connection b172499342414916c8b581da3a2a, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: b172499342414916c8b581da3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:50 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:12:50 client -> Sending packet 1 (1280 bytes) for connection b172499342414916c8b581da3a2a, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: b172499342414916c8b581da3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:50 client -> Sending packet 2 (1280 bytes) for connection b172499342414916c8b581da3a2a, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: b172499342414916c8b581da3a2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:50 client <- Reading packet 119695 (183 bytes) for connection (empty), Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5631be716f74bbd3, Token: (empty), PacketNumber: 119695, PacketNumberLen: 4, Length: 165, Version: v1} 2025/04/30 09:12:50 client Received first packet. Switching destination connection ID to: 5631be716f74bbd3 2025/04/30 09:12:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:50 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5631be716f74bbd3, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client -> Sending packet 3 (1280 bytes) for connection b172499342414916c8b581da3a2a, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: 5631be716f74bbd3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 119695, LowestAcked: 119695, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client Queueing packet (183 bytes) for later decryption 2025/04/30 09:12:50 client -> Sending packet 0 (43 bytes) for connection b172499342414916c8b581da3a2a, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: 5631be716f74bbd3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client Dropping Initial keys. 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:12:50 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:12:50 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5631be716f74bbd3, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client -> Sending packet 1 (43 bytes) for connection b172499342414916c8b581da3a2a, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: 5631be716f74bbd3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 1: 823 bytes. Remaining: 55 bytes. 2025/04/30 09:12:50 client <- Reading packet 4 (823 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5631be716f74bbd3, PacketNumber: 4, PacketNumberLen: 4, Length: 806, Version: v1} 2025/04/30 09:12:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 09:12:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b172499342414916c8b581da3a2a, InitialSourceConnectionID: 5631be716f74bbd3, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x3865dbb58c81727ce05375a7d5a0dd5d} 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 09:12:50 client Peer doesn't await address validation any longer. 2025/04/30 09:12:50 client Canceling loss detection timer. 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 0 bytes. 2025/04/30 09:12:50 client <- Reading packet 5 (55 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5631be716f74bbd3, PacketNumber: 5, PacketNumberLen: 4, Length: 38, Version: v1} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 09:12:50 client -> Sending packet 2 (128 bytes) for connection b172499342414916c8b581da3a2a, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: 5631be716f74bbd3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client Short Header{DestConnectionID: 5631be716f74bbd3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:50 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.NewTokenFrame{Token: 0xa0dddd169cb32c9f730860f161a5f3d47d18df835c866d8b58c9d1b7e60072bf6948b9e12584b185b5795842bfb02e93639f} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f60056595d6fe1f2, StatelessResetToken: 0xd768b6e8adbc0d595bdb09be83d15aac} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 98b5ce400e0485c0, StatelessResetToken: 0xd9fe7eefb9e99881cb16ce8526189b80} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 57200382cde54795, StatelessResetToken: 0x642cf3ab13764786a42b29a483bcdacc} 2025/04/30 09:12:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:50 client -> Sending packet 1 (40 bytes) for connection b172499342414916c8b581da3a2a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f60056595d6fe1f2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 233.4589ms, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:50 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:50 client newly acked packets (2): [0 1] 2025/04/30 09:12:50 client updated RTT: 31.917596ms (σ: 15.958798ms) 2025/04/30 09:12:50 client ECN capability confirmed. 2025/04/30 09:12:50 client Canceling loss detection timer. 2025/04/30 09:12:50 client Dropping Handshake keys. 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 51f43b159537bbfe, StatelessResetToken: 0xbeb9b48c2e2aec554b27a794f4244990} 2025/04/30 09:12:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:50 client Ignoring all packets below 1. 2025/04/30 09:12:50 client -> Sending packet 2 (35 bytes) for connection b172499342414916c8b581da3a2a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f60056595d6fe1f2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 186.468µs, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:50 client -> Sending packet 3 (30 bytes) for connection b172499342414916c8b581da3a2a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f60056595d6fe1f2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:50 client Connection b172499342414916c8b581da3a2a closed. 2025/04/30 09:12:50 Requesting https://server4:443/bdlbhpykqp. 2025/04/30 09:12:50 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:50 Increased send buffer size to 14336 kiB 2025/04/30 09:12:50 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:50 Created qlog file: /logs/qlog/732e717a477e48a85f2073745235e5791e1e99b2.sqlog 2025/04/30 09:12:50 client Starting new connection to server4 ([::]:43850 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 732e717a477e48a85f2073745235e5791e1e99b2, version v1 2025/04/30 09:12:50 Adding connection ID (empty). 2025/04/30 09:12:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:12:50 client -> Sending packet 0 (1280 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: 732e717a477e48a85f2073745235e5791e1e99b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 1: 137 bytes. Remaining: 1115 bytes. 2025/04/30 09:12:50 client <- Reading packet 120389 (137 bytes) for connection (empty), Initial 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27b0a0ef7e48dfc9, Token: (empty), PacketNumber: 120389, PacketNumberLen: 4, Length: 119, Version: v1} 2025/04/30 09:12:50 client Received first packet. Switching destination connection ID to: 27b0a0ef7e48dfc9 2025/04/30 09:12:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 09:12:50 client newly acked packets (1): [0] 2025/04/30 09:12:50 client updated RTT: 33.051903ms (σ: 16.525951ms) 2025/04/30 09:12:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:12:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 359 bytes. 2025/04/30 09:12:50 client <- Reading packet 0 (756 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27b0a0ef7e48dfc9, PacketNumber: 0, PacketNumberLen: 4, Length: 739, Version: v1} 2025/04/30 09:12:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 09:12:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 732e717a477e48a85f2073745235e5791e1e99b2, InitialSourceConnectionID: 27b0a0ef7e48dfc9, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x1cd5ab6873fe7a4cf85b83d5559f2e77} 2025/04/30 09:12:50 client Parsed a coalesced packet. Part 3: 359 bytes. Remaining: 0 bytes. 2025/04/30 09:12:50 client <- Reading packet 1 (359 bytes) for connection (empty), Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27b0a0ef7e48dfc9, PacketNumber: 1, PacketNumberLen: 4, Length: 342, Version: v1} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2 2025/04/30 09:12:50 client Long Header{Type: Initial, DestConnectionID: 27b0a0ef7e48dfc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 120389, LowestAcked: 120389, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: 27b0a0ef7e48dfc9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client Dropping Initial keys. 2025/04/30 09:12:50 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.NewTokenFrame{Token: 0xd9b6d38496c07fc38b118aad5847b0d0a8d18ae7b407ff53903492df402103624b00e019c8ca6970b75d4176168315da8701} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f2b371253f501d07, StatelessResetToken: 0x664c2045c1f226e039f129600794da40} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d1c7df9a287c4a5, StatelessResetToken: 0x7241391c8f1fcaf075336c7968dd2c13} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1574e50d9263eede, StatelessResetToken: 0xca6df106ff362664e09a496ce1bc2e8e} 2025/04/30 09:12:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:50 client -> Sending packet 1 (91 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: f2b371253f501d07, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:50 client -> Sending packet 1 (36 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 642.409µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:12:50 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:50 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:50 client -> Sending packet 2 (36 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.307994ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:12:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:12:50 client -> Sending packet 2 (74 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: f2b371253f501d07, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client -> Sending packet 3 (74 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: f2b371253f501d07, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:12:50 client -> Sending packet 4 (74 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: f2b371253f501d07, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client -> Sending packet 5 (74 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, Handshake 2025/04/30 09:12:50 client Long Header{Type: Handshake, DestConnectionID: f2b371253f501d07, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:12:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:50 client <- Reading packet 5 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.NewTokenFrame{Token: 0xd9b6d38496c07fc38b118aad5847b0d0a8d18ae7b407ff53903492df402103624b00e019c8ca6970b75d4176168315da8701} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f2b371253f501d07, StatelessResetToken: 0x664c2045c1f226e039f129600794da40} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d1c7df9a287c4a5, StatelessResetToken: 0x7241391c8f1fcaf075336c7968dd2c13} 2025/04/30 09:12:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1574e50d9263eede, StatelessResetToken: 0xca6df106ff362664e09a496ce1bc2e8e} 2025/04/30 09:12:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:50 client -> Sending packet 3 (37 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 91.591µs, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:12:50 client <- Reading packet 6 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.PingFrame{} 2025/04/30 09:12:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 09:12:50 client Sending ACK because the ACK timer expired. 2025/04/30 09:12:50 client -> Sending packet 4 (38 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 25.290029ms, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:12:50 client <- Reading packet 7 (55 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:50 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:12:50 client Dropping Handshake keys. 2025/04/30 09:12:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:12:50 client -> Sending packet 6 (58 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 70.952µs, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:12:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:50 client -> Sending packet 7 (48 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:50 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:51 client <- Reading packet 8 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:12:51 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:51 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:12:51 client newly acked packets (1): [7] 2025/04/30 09:12:51 client updated RTT: 32.893ms (σ: 12.708ms) 2025/04/30 09:12:51 client ECN capability confirmed. 2025/04/30 09:12:51 client Canceling loss detection timer. 2025/04/30 09:12:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7e97a1010c66d6d6, StatelessResetToken: 0xaa41dcfc0a45b3e72e7bb9ab7e347b70} 2025/04/30 09:12:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:12:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:12:51 client -> Sending packet 8 (30 bytes) for connection 732e717a477e48a85f2073745235e5791e1e99b2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:51 client Short Header{DestConnectionID: f2b371253f501d07, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:12:51 client Connection 732e717a477e48a85f2073745235e5791e1e99b2 closed.