2025/04/30 11:02:50 Requesting https://server4:443/oqprnmzznu. 2025/04/30 11:02:50 Increased receive buffer size to 14336 kiB 2025/04/30 11:02:50 Increased send buffer size to 14336 kiB 2025/04/30 11:02:50 Setting DF for IPv4 and IPv6. 2025/04/30 11:02:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:02:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:02:50 Created qlog file: /logs/qlog/547fe1b845ee596539914327f366.sqlog 2025/04/30 11:02:50 client Starting new connection to server4 ([::]:48635 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 547fe1b845ee596539914327f366, version v1 2025/04/30 11:02:50 Adding connection ID (empty). 2025/04/30 11:02:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:02:50 client -> Sending packet 0 (1280 bytes) for connection 547fe1b845ee596539914327f366, Initial 2025/04/30 11:02:50 client Long Header{Type: Initial, DestConnectionID: 547fe1b845ee596539914327f366, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:02:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:02:50 client Parsed a coalesced packet. Part 1: 131 bytes. Remaining: 1149 bytes. 2025/04/30 11:02:50 client <- Reading packet 0 (131 bytes) for connection (empty), Initial 2025/04/30 11:02:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 117, Version: v1} 2025/04/30 11:02:50 client Received first packet. Switching destination connection ID to: 2d5b5918 2025/04/30 11:02:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:50 client newly acked packets (1): [0] 2025/04/30 11:02:50 client updated RTT: 38.762463ms (σ: 19.381231ms) 2025/04/30 11:02:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:02:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:02:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:02:50 client Parsed a coalesced packet. Part 2: 1149 bytes. Remaining: 0 bytes. 2025/04/30 11:02:50 client <- Reading packet 0 (1149 bytes) for connection (empty), Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 0, PacketNumberLen: 2, Length: 1136, Version: v1} 2025/04/30 11:02:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 1114, Offset + Data length: 1114} 2025/04/30 11:02:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 547fe1b845ee596539914327f366, InitialSourceConnectionID: 2d5b5918, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x47a83b4c6e8078eda687b5b17ae5de8f} 2025/04/30 11:02:50 client -> Sending packet 1 (1280 bytes) for connection 547fe1b845ee596539914327f366, Initial 2025/04/30 11:02:50 client Long Header{Type: Initial, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:02:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:50 client -> Sending packet 0 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:50 client Dropping Initial keys. 2025/04/30 11:02:50 client <- Reading packet 1 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 1, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:50 client <- &wire.CryptoFrame{Offset: 1114, Data length: 1244, Offset + Data length: 2358} 2025/04/30 11:02:50 client -> Sending packet 1 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:50 client <- Reading packet 2 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 2, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:50 client <- &wire.CryptoFrame{Offset: 2358, Data length: 1244, Offset + Data length: 3602} 2025/04/30 11:02:50 client -> Sending packet 2 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:50 client -> Sending packet 3 (33 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:50 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 11:02:50 client -> &wire.PingFrame{} 2025/04/30 11:02:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:02:51 client -> Sending packet 4 (33 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 11:02:51 client -> &wire.PingFrame{} 2025/04/30 11:02:51 client -> Sending packet 5 (33 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 11:02:51 client -> &wire.PingFrame{} 2025/04/30 11:02:51 client <- Reading packet 3 (1154 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 3, PacketNumberLen: 2, Length: 1141, Version: v1} 2025/04/30 11:02:51 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 11:02:51 client Peer doesn't await address validation any longer. 2025/04/30 11:02:51 client newly acked packets (1): [5] 2025/04/30 11:02:51 client updated RTT: 37.917ms (σ: 16.225ms) 2025/04/30 11:02:51 client Canceling loss detection timer. 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 1114, Offset + Data length: 1114} 2025/04/30 11:02:51 client -> Sending packet 6 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client <- Reading packet 4 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 4, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 1114, Data length: 1244, Offset + Data length: 2358} 2025/04/30 11:02:51 client -> Sending packet 7 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client <- Reading packet 5 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 5, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 3602, Data length: 1244, Offset + Data length: 4846} 2025/04/30 11:02:51 client -> Sending packet 8 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client <- Reading packet 6 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 6, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 4846, Data length: 1244, Offset + Data length: 6090} 2025/04/30 11:02:51 client -> Sending packet 9 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client <- Reading packet 7 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 7, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 6090, Data length: 1244, Offset + Data length: 7334} 2025/04/30 11:02:51 client -> Sending packet 10 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client <- Reading packet 8 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 8, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 7334, Data length: 1244, Offset + Data length: 8578} 2025/04/30 11:02:51 client -> Sending packet 11 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client <- Reading packet 9 (1280 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 9, PacketNumberLen: 2, Length: 1267, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 8578, Data length: 1244, Offset + Data length: 9822} 2025/04/30 11:02:51 client -> Sending packet 12 (36 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 2d5b5918, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client Parsed a coalesced packet. Part 1: 174 bytes. Remaining: 91 bytes. 2025/04/30 11:02:51 client <- Reading packet 10 (174 bytes) for connection (empty), Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5b5918, PacketNumber: 10, PacketNumberLen: 2, Length: 161, Version: v1} 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 9822, Data length: 138, Offset + Data length: 9960} 2025/04/30 11:02:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:02:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:02:51 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77a20167, StatelessResetToken: 0x35e049372c3b0249e5055693375fb6dc} 2025/04/30 11:02:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5933885c, StatelessResetToken: 0x8e400a6fab254331ac9f0ebba1e0dc57} 2025/04/30 11:02:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 182be9ee, StatelessResetToken: 0x8a3fae54bb6f660960e760db0c781106} 2025/04/30 11:02:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:02:51 client -> Sending packet 13 (119 bytes) for connection 547fe1b845ee596539914327f366, Handshake 2025/04/30 11:02:51 client Long Header{Type: Handshake, DestConnectionID: 182be9ee, SrcConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:02:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:02:51 client Short Header{DestConnectionID: 182be9ee, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:02:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:02:51 client -> Sending packet 1 (28 bytes) for connection 547fe1b845ee596539914327f366, 1-RTT (ECN: ECT(0)) 2025/04/30 11:02:51 client Short Header{DestConnectionID: 182be9ee, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 496.616µs} 2025/04/30 11:02:51 client <- Reading packet 1 (259 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 240µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:02:51 client newly acked packets (1): [0] 2025/04/30 11:02:51 client Canceling loss detection timer. 2025/04/30 11:02:51 client Dropping Handshake keys. 2025/04/30 11:02:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:02:51 client <- &wire.NewTokenFrame{Token: 0xd5b560e4644384b480f116fc030ed97c329b950abeea79124695e9d519180b2073cc97ff434397a1dc88a259a3e0f5820f3bd8abc0679428b2164bb69cad1e3505cb3ed0b04e9bb730c8bb8dabae7cf5eeccf1a04f5d} 2025/04/30 11:02:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:02:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:02:51 client <- Reading packet 2 (1280 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1259, Offset + Data length: 1259} 2025/04/30 11:02:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:02:51 client -> Sending packet 2 (31 bytes) for connection 547fe1b845ee596539914327f366, 1-RTT (ECN: ECT(0)) 2025/04/30 11:02:51 client Short Header{DestConnectionID: 182be9ee, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 52.047µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:02:51 client <- Reading packet 3 (1280 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1259, Data length: 1257, Offset + Data length: 2516} 2025/04/30 11:02:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:02:51 client <- Reading packet 4 (1280 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2516, Data length: 1257, Offset + Data length: 3773} 2025/04/30 11:02:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:02:51 client -> Sending packet 3 (31 bytes) for connection 547fe1b845ee596539914327f366, 1-RTT (ECN: ECT(0)) 2025/04/30 11:02:51 client Short Header{DestConnectionID: 182be9ee, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 45.565µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:02:51 client <- Reading packet 5 (1280 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3773, Data length: 1257, Offset + Data length: 5030} 2025/04/30 11:02:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:02:51 client <- Reading packet 6 (113 bytes) for connection (empty), 1-RTT 2025/04/30 11:02:51 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 5030, Data length: 90, Offset + Data length: 5120} 2025/04/30 11:02:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:02:51 client -> Sending packet 4 (31 bytes) for connection 547fe1b845ee596539914327f366, 1-RTT (ECN: ECT(0)) 2025/04/30 11:02:51 client Short Header{DestConnectionID: 182be9ee, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 41.598µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:02:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:02:51 client -> Sending packet 5 (26 bytes) for connection 547fe1b845ee596539914327f366, 1-RTT (ECN: ECT(0)) 2025/04/30 11:02:51 client Short Header{DestConnectionID: 182be9ee, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:02:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:02:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:02:51 client Connection 547fe1b845ee596539914327f366 closed.