2025/04/30 10:59:30 Requesting https://server4:443/dulavcswch. 2025/04/30 10:59:30 Increased receive buffer size to 14336 kiB 2025/04/30 10:59:30 Increased send buffer size to 14336 kiB 2025/04/30 10:59:30 Setting DF for IPv4 and IPv6. 2025/04/30 10:59:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:59:30 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:59:30 Created qlog file: /logs/qlog/c0291391f82116f58f09d0d7.sqlog 2025/04/30 10:59:30 client Starting new connection to server4 ([::]:47368 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c0291391f82116f58f09d0d7, version v1 2025/04/30 10:59:30 Adding connection ID (empty). 2025/04/30 10:59:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:59:30 client -> Sending packet 0 (1280 bytes) for connection c0291391f82116f58f09d0d7, Initial 2025/04/30 10:59:30 client Long Header{Type: Initial, DestConnectionID: c0291391f82116f58f09d0d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:59:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:59:30 client Parsed a coalesced packet. Part 1: 440 bytes. Remaining: 840 bytes. 2025/04/30 10:59:30 client <- Reading packet 0 (440 bytes) for connection (empty), Initial 2025/04/30 10:59:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5d68770, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 426, Version: v1} 2025/04/30 10:59:30 client Received first packet. Switching destination connection ID to: e5d68770 2025/04/30 10:59:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:59:30 client newly acked packets (1): [0] 2025/04/30 10:59:30 client updated RTT: 38.734712ms (σ: 19.367356ms) 2025/04/30 10:59:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:59:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:59:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:59:30 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 91 bytes. 2025/04/30 10:59:30 client <- Reading packet 0 (749 bytes) for connection (empty), Handshake 2025/04/30 10:59:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5d68770, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 10:59:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 10:59:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:59:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:59:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c0291391f82116f58f09d0d7, InitialSourceConnectionID: e5d68770, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x858792c781cce400a0a2d4214ca16ed5} 2025/04/30 10:59:30 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 10:59:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7a1c4c7c, StatelessResetToken: 0x7d18a0391493285bf47c392aabd528e5} 2025/04/30 10:59:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ad7693d8, StatelessResetToken: 0xf9b16275818329f6a4bfbb3ba4120ffd} 2025/04/30 10:59:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e68df60, StatelessResetToken: 0x44f1542801d4bc29050eec316c169290} 2025/04/30 10:59:30 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:59:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c0291391f82116f58f09d0d7 2025/04/30 10:59:30 client Long Header{Type: Initial, DestConnectionID: 3e68df60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 10:59:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:59:30 client Long Header{Type: Handshake, DestConnectionID: 3e68df60, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:59:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:59:30 client Short Header{DestConnectionID: 3e68df60, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:59:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:59:30 client Dropping Initial keys. 2025/04/30 10:59:30 client -> Sending packet 1 (36 bytes) for connection c0291391f82116f58f09d0d7, Handshake 2025/04/30 10:59:30 client Long Header{Type: Handshake, DestConnectionID: 3e68df60, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:59:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:59:30 client -> Sending packet 1 (29 bytes) for connection c0291391f82116f58f09d0d7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:59:30 client Short Header{DestConnectionID: 3e68df60, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.048575ms} 2025/04/30 10:59:30 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 10:59:30 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 10:59:30 client Peer doesn't await address validation any longer. 2025/04/30 10:59:30 client newly acked packets (1): [0] 2025/04/30 10:59:30 client updated RTT: 37.938ms (σ: 16.116ms) 2025/04/30 10:59:30 client Canceling loss detection timer. 2025/04/30 10:59:30 client Dropping Handshake keys. 2025/04/30 10:59:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:59:30 client <- &wire.NewTokenFrame{Token: 0x7ec20995acd4d3c73338ca233884668d236962da60379a6879cc6d1f9d5f235060bd7efc136071d27e65f7f003d52d3e8af2f0d31c1cd8b25073b1ce0a513ff16e50ca84e92279126ec455989f42505ed6540110d2a8} 2025/04/30 10:59:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:59:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:59:30 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 10:59:30 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:59:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:59:30 client -> Sending packet 2 (31 bytes) for connection c0291391f82116f58f09d0d7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:59:30 client Short Header{DestConnectionID: 3e68df60, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 46.496µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 10:59:30 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:59:30 client -> Sending packet 3 (26 bytes) for connection c0291391f82116f58f09d0d7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:59:30 client Short Header{DestConnectionID: 3e68df60, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:59:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:59:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:59:30 client Connection c0291391f82116f58f09d0d7 closed.