2025/04/30 09:09:29 Requesting https://server4:443/ihbsfaaftp. 2025/04/30 09:09:29 Increased receive buffer size to 14336 kiB 2025/04/30 09:09:29 Increased send buffer size to 14336 kiB 2025/04/30 09:09:29 Setting DF for IPv4 and IPv6. 2025/04/30 09:09:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:09:29 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:09:29 Created qlog file: /logs/qlog/d746114c7d379347742a7d.sqlog 2025/04/30 09:09:29 client Starting new connection to server4 ([::]:54044 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d746114c7d379347742a7d, version v1 2025/04/30 09:09:29 Adding connection ID (empty). 2025/04/30 09:09:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 09:09:29 client -> Sending packet 0 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:29 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:09:29 client -> Sending packet 1 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:29 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:29 client -> Sending packet 2 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:29 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 09:09:30 client -> Sending packet 3 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:30 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:30 client -> Sending packet 4 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:30 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:09:31 client -> Sending packet 5 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:31 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:31 client -> Sending packet 6 (1280 bytes) for connection d746114c7d379347742a7d, Initial 2025/04/30 09:09:31 client Long Header{Type: Initial, DestConnectionID: d746114c7d379347742a7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 1: 138 bytes. Remaining: 1114 bytes. 2025/04/30 09:09:31 client <- Reading packet 89529 (138 bytes) for connection (empty), Initial 2025/04/30 09:09:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, Token: (empty), PacketNumber: 89529, PacketNumberLen: 4, Length: 120, Version: v1} 2025/04/30 09:09:31 client Received first packet. Switching destination connection ID to: e1095d7cd00c93ca 2025/04/30 09:09:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 09:09:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:09:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:09:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 367 bytes. 2025/04/30 09:09:31 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 0, PacketNumberLen: 4, Length: 730, Version: v1} 2025/04/30 09:09:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:09:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:09:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:09:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d746114c7d379347742a7d, InitialSourceConnectionID: e1095d7cd00c93ca, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x83acda29ca5268fd7f4a14572addb818} 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 3: 367 bytes. Remaining: 0 bytes. 2025/04/30 09:09:31 client <- Reading packet 1 (367 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 1, PacketNumberLen: 4, Length: 350, Version: v1} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d746114c7d379347742a7d 2025/04/30 09:09:31 client Long Header{Type: Initial, DestConnectionID: e1095d7cd00c93ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 89529, LowestAcked: 89529, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: e1095d7cd00c93ca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:31 client Dropping Initial keys. 2025/04/30 09:09:31 client <- Reading packet 0 (183 bytes) for connection (empty), 1-RTT 2025/04/30 09:09:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:09:31 client <- &wire.NewTokenFrame{Token: 0x8458480550dbb69b6215e1d770bc217f85ad1525ab1eb24d51134793d9b81cefd72cb4f4b0be6baabc8b74f3a5d8456a42d4} 2025/04/30 09:09:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29eb91ec53f6682, StatelessResetToken: 0xe8d216a53d28f9c22531004b9eccf1dd} 2025/04/30 09:09:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cd15814b01d50a97, StatelessResetToken: 0x368bbae403170ea556c594b400b99cdf} 2025/04/30 09:09:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a496e09862352dd9, StatelessResetToken: 0xa8932cd70740ba8b1c6822e21c24b7d0} 2025/04/30 09:09:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:09:31 client -> Sending packet 1 (91 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:09:31 client Short Header{DestConnectionID: d29eb91ec53f6682, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:09:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:09:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:09:31 client -> Sending packet 1 (36 bytes) for connection d746114c7d379347742a7d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:09:31 client Short Header{DestConnectionID: d29eb91ec53f6682, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 894.277µs, ECT0: 0, ECT1: 1, CE: 0} 2025/04/30 09:09:31 client <- Reading packet 1 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 09:09:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:09:31 client Sending ACK because the ACK timer expired. 2025/04/30 09:09:31 client -> Sending packet 2 (36 bytes) for connection d746114c7d379347742a7d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:09:31 client Short Header{DestConnectionID: d29eb91ec53f6682, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.262763ms, ECT0: 0, ECT1: 2, CE: 0} 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:31 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:31 client <- Reading packet 2 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 2, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client -> Sending packet 2 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 3, CE: 0} 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:31 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:31 client <- Reading packet 3 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 3, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client -> Sending packet 3 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 4, CE: 0} 2025/04/30 09:09:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:09:31 client -> Sending packet 4 (74 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:31 client -> Sending packet 5 (74 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:31 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:31 client <- Reading packet 4 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 4, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client -> Sending packet 6 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 5, CE: 0} 2025/04/30 09:09:31 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:31 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:31 client <- Reading packet 5 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 5, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client -> Sending packet 7 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 6, CE: 0} 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:31 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:31 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:31 client <- Reading packet 6 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 6, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:31 client <- &wire.PingFrame{} 2025/04/30 09:09:31 client -> Sending packet 8 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:31 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 7, CE: 0} 2025/04/30 09:09:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:09:31 client -> Sending packet 9 (74 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:31 client -> Sending packet 10 (74 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:31 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:32 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:32 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:32 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:32 client <- Reading packet 7 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 7, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:32 client <- &wire.PingFrame{} 2025/04/30 09:09:32 client -> Sending packet 11 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:32 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 8, CE: 0} 2025/04/30 09:09:32 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:32 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:32 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:32 client <- Reading packet 8 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 8, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:32 client <- &wire.PingFrame{} 2025/04/30 09:09:32 client -> Sending packet 12 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:32 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 9, CE: 0} 2025/04/30 09:09:32 client Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 1069 bytes. 2025/04/30 09:09:32 client Dropping %!s(logging.PacketType=0) packet (183 bytes) because we already dropped the keys. 2025/04/30 09:09:32 client Parsed a coalesced packet. Part 2: 1069 bytes. Remaining: 0 bytes. 2025/04/30 09:09:32 client <- Reading packet 9 (1069 bytes) for connection (empty), Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1095d7cd00c93ca, PacketNumber: 9, PacketNumberLen: 4, Length: 1052, Version: v1} 2025/04/30 09:09:32 client <- &wire.PingFrame{} 2025/04/30 09:09:32 client -> Sending packet 13 (43 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 09:09:32 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 10, CE: 0} 2025/04/30 09:09:32 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 09:09:32 client -> Sending packet 14 (74 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:32 client -> Sending packet 15 (74 bytes) for connection d746114c7d379347742a7d, Handshake 2025/04/30 09:09:32 client Long Header{Type: Handshake, DestConnectionID: d29eb91ec53f6682, SrcConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 09:09:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:09:32 client <- Reading packet 2 (1207 bytes) for connection (empty), 1-RTT 2025/04/30 09:09:32 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:09:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:09:32 client Peer doesn't await address validation any longer. 2025/04/30 09:09:32 client newly acked packets (1): [0] 2025/04/30 09:09:32 client Canceling loss detection timer. 2025/04/30 09:09:32 client Dropping Handshake keys. 2025/04/30 09:09:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3c3530cd7d132059, StatelessResetToken: 0xb1bbe836f00278a0c3ff6240f39139ab} 2025/04/30 09:09:32 client <- &wire.HandshakeDoneFrame{} 2025/04/30 09:09:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:09:32 client Setting ACK timer to max ack delay: 25ms 2025/04/30 09:09:32 client -> Sending packet 3 (1360 bytes) for connection d746114c7d379347742a7d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:09:32 client Short Header{DestConnectionID: d29eb91ec53f6682, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:09:32 client -> &wire.PingFrame{} 2025/04/30 09:09:32 client Closing connection with error: Application error 0x0 (local) 2025/04/30 09:09:32 client -> Sending packet 4 (30 bytes) for connection d746114c7d379347742a7d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:09:32 client Short Header{DestConnectionID: d29eb91ec53f6682, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:09:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:09:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 09:09:32 client Connection d746114c7d379347742a7d closed.