2025/04/30 11:03:55 Requesting https://server4:443/eprlikampp. 2025/04/30 11:03:55 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:55 Increased send buffer size to 14336 kiB 2025/04/30 11:03:55 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:55 Created qlog file: /logs/qlog/ff0a5495f458c161f047a6f4a65d.sqlog 2025/04/30 11:03:55 client Starting new connection to server4 ([::]:53194 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ff0a5495f458c161f047a6f4a65d, version v1 2025/04/30 11:03:55 Adding connection ID (empty). 2025/04/30 11:03:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:55 client -> Sending packet 0 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: ff0a5495f458c161f047a6f4a65d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:03:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:55 client -> Sending packet 1 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: ff0a5495f458c161f047a6f4a65d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:03:55 client -> Sending packet 2 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: ff0a5495f458c161f047a6f4a65d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:03:55 client <- Reading packet 1 (39 bytes) for connection (empty), Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:03:55 client Received first packet. Switching destination connection ID to: 98321bc0 2025/04/30 11:03:55 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:03:55 client newly acked packets (1): [2] 2025/04/30 11:03:55 client updated RTT: 33.005291ms (σ: 16.502645ms) 2025/04/30 11:03:55 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 client -> Sending packet 3 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: 98321bc0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:55 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:55 client -> Sending packet 4 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: 98321bc0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:55 client <- Reading packet 2 (748 bytes) for connection (empty), Handshake 2025/04/30 11:03:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98321bc0, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ff0a5495f458c161f047a6f4a65d, InitialSourceConnectionID: 98321bc0, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x7b56aac887a3ec576c1905a701d74188} 2025/04/30 11:03:55 client -> Sending packet 0 (75 bytes) for connection ff0a5495f458c161f047a6f4a65d, Handshake 2025/04/30 11:03:55 client Long Header{Type: Handshake, DestConnectionID: 98321bc0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:55 client Dropping Initial keys. 2025/04/30 11:03:55 client -> Sending packet 0 (42 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 client Short Header{DestConnectionID: 98321bc0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:55 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 311df184, StatelessResetToken: 0x62687a59e9f37bc6b4d67dc4bd2d587e} 2025/04/30 11:03:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 387d7e87, StatelessResetToken: 0xc4187397dbb1d3f495c853a73f707381} 2025/04/30 11:03:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:55 client Dropping Handshake keys. 2025/04/30 11:03:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:55 client <- &wire.NewTokenFrame{Token: 0xcbb7c7f0da5e6a0473436983b8a0f62b5deeebf4d9a7806fb18431eb6c42baa06ae5aae1a7b9c86864a308805252109df981bde4ee10b17b1e7b8463b143dcddfa83f4e9cd7865f9725c42e89be91526c76d513af2b4} 2025/04/30 11:03:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb195d5d, StatelessResetToken: 0xb78341889826e39961c66abb63c5e91b} 2025/04/30 11:03:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:55 client -> Sending packet 1 (33 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 client Short Header{DestConnectionID: 387d7e87, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 114.373µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:55 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:55 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client <- &wire.NewTokenFrame{Token: 0xcbb7c7f0da5e6a0473436983b8a0f62b5deeebf4d9a7806fb18431eb6c42baa06ae5aae1a7b9c86864a308805252109df981bde4ee10b17b1e7b8463b143dcddfa83f4e9cd7865f9725c42e89be91526c76d513af2b4} 2025/04/30 11:03:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 311df184, StatelessResetToken: 0x62687a59e9f37bc6b4d67dc4bd2d587e} 2025/04/30 11:03:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 387d7e87, StatelessResetToken: 0xc4187397dbb1d3f495c853a73f707381} 2025/04/30 11:03:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb195d5d, StatelessResetToken: 0xb78341889826e39961c66abb63c5e91b} 2025/04/30 11:03:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:55 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:55 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:55 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:55 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:55 client -> Sending packet 2 (33 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 client Short Header{DestConnectionID: 387d7e87, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 61.014µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:55 client -> Sending packet 3 (26 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 client Short Header{DestConnectionID: 387d7e87, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:55 client Connection ff0a5495f458c161f047a6f4a65d closed. 2025/04/30 11:03:55 Requesting https://server4:443/ihkzyuiova. 2025/04/30 11:03:55 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:55 Increased send buffer size to 14336 kiB 2025/04/30 11:03:55 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:55 Created qlog file: /logs/qlog/8314cf9add8b5478.sqlog 2025/04/30 11:03:55 client Starting new connection to server4 ([::]:42247 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8314cf9add8b5478, version v1 2025/04/30 11:03:55 Adding connection ID (empty). 2025/04/30 11:03:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:55 client -> Sending packet 0 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: 8314cf9add8b5478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:55 client -> Sending packet 1 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: 8314cf9add8b5478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:55 client -> Sending packet 2 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:55 client Long Header{Type: Initial, DestConnectionID: 8314cf9add8b5478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:56 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 947224c7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 client Received first packet. Switching destination connection ID to: 947224c7 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client -> Sending packet 3 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 947224c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:56 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 947224c7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 client -> Sending packet 4 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 947224c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:56 client <- Reading packet 1 (737 bytes) for connection (empty), Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 947224c7, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:03:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8314cf9add8b5478, InitialSourceConnectionID: 947224c7, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xac29f286137a9ecfd74c301cea751957} 2025/04/30 11:03:56 client -> Sending packet 0 (75 bytes) for connection 8314cf9add8b5478, Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: 947224c7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 client Dropping Initial keys. 2025/04/30 11:03:56 client -> Sending packet 0 (42 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 947224c7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 client <- Reading packet 2 (737 bytes) for connection (empty), Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 947224c7, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:03:56 client -> Sending packet 1 (36 bytes) for connection 8314cf9add8b5478, Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: 947224c7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:56 client <- Reading packet 2 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 client Dropping Handshake keys. 2025/04/30 11:03:56 client <- &wire.NewTokenFrame{Token: 0x3264ba7a482ec8394b425df2912c017d806b0b3c8c94e52bd121413a8ce30202ca38e8a5f997d2c991e5446a51685892bf2aedf318f3f7f5021a4799854ab362d04e278878dabe658a8466dd7acaf709d51a79217c78} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 004daf06, StatelessResetToken: 0xc777a3b8f4fcc2be72d4b7b221f73fd1} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579102, StatelessResetToken: 0x7fc589fc6f6cedb0845da69e5e7c5012} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ded46327, StatelessResetToken: 0x980d48862e6d5f756129547c02ae9af5} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:03:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 client -> Sending packet 1 (1366 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 004daf06, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.PingFrame{} 2025/04/30 11:03:56 client -> Sending packet 2 (33 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 004daf06, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 164.677µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579102, StatelessResetToken: 0x7fc589fc6f6cedb0845da69e5e7c5012} 2025/04/30 11:03:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ded46327, StatelessResetToken: 0x980d48862e6d5f756129547c02ae9af5} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 004daf06, StatelessResetToken: 0xc777a3b8f4fcc2be72d4b7b221f73fd1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:03:56 client <- &wire.NewTokenFrame{Token: 0x3264ba7a482ec8394b425df2912c017d806b0b3c8c94e52bd121413a8ce30202ca38e8a5f997d2c991e5446a51685892bf2aedf318f3f7f5021a4799854ab362d04e278878dabe658a8466dd7acaf709d51a79217c78} 2025/04/30 11:03:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.PingFrame{} 2025/04/30 11:03:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:56 client -> Sending packet 3 (31 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 004daf06, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 81.622µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 152µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client newly acked packets (1): [2] 2025/04/30 11:03:56 client updated RTT: 31.961034ms (σ: 15.980517ms) 2025/04/30 11:03:56 client ECN capability confirmed. 2025/04/30 11:03:56 client lost packet 0 (time threshold) 2025/04/30 11:03:56 client setting loss timer for packet 1 (1-RTT) to 35.956163ms (in 2025-04-30 11:03:56.291475269 +0000 UTC m=+0.810388676) 2025/04/30 11:03:56 client Canceling loss detection timer. 2025/04/30 11:03:56 client Ignoring all packets below 3. 2025/04/30 11:03:56 client -> Sending packet 4 (42 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 004daf06, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:03:56.291475269 +0000 UTC m=+0.810388676 2025/04/30 11:03:56 client lost packet 1 (time threshold) 2025/04/30 11:03:56 client <- Reading packet 6 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 240µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client newly acked packets (1): [4] 2025/04/30 11:03:56 client updated RTT: 31.934ms (σ: 12.038ms) 2025/04/30 11:03:56 client Canceling loss detection timer. 2025/04/30 11:03:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:56 client -> Sending packet 5 (26 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 004daf06, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:56 client Connection 8314cf9add8b5478 closed. 2025/04/30 11:03:56 Requesting https://server4:443/whzolzomee. 2025/04/30 11:03:56 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:56 Increased send buffer size to 14336 kiB 2025/04/30 11:03:56 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/20866a1eba579dd18ecd1c842aeb4b.sqlog 2025/04/30 11:03:56 client Starting new connection to server4 ([::]:50965 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 20866a1eba579dd18ecd1c842aeb4b, version v1 2025/04/30 11:03:56 Adding connection ID (empty). 2025/04/30 11:03:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:56 client -> Sending packet 0 (1280 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 20866a1eba579dd18ecd1c842aeb4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 1: 449 bytes. Remaining: 831 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (449 bytes) for connection (empty), Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 522b15e7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:03:56 client Received first packet. Switching destination connection ID to: 522b15e7 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client newly acked packets (1): [0] 2025/04/30 11:03:56 client updated RTT: 33.360603ms (σ: 16.680301ms) 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 91 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 522b15e7, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:03:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 20866a1eba579dd18ecd1c842aeb4b, InitialSourceConnectionID: 522b15e7, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe6c3afbc7e5ea4c1a09c9ab37c68fa9f} 2025/04/30 11:03:56 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da98d8ce, StatelessResetToken: 0x41c60aed2193afc571dd87e66ac02f5f} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0cd56ab9, StatelessResetToken: 0x77f8cff2a9a42ea6a5bc7298c1d8956c} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 844b7577, StatelessResetToken: 0xcd04b321c7c67b43c554f735158f3b02} 2025/04/30 11:03:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: da98d8ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: da98d8ce, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 client Short Header{DestConnectionID: da98d8ce, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 client Dropping Initial keys. 2025/04/30 11:03:56 client -> Sending packet 1 (78 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: da98d8ce, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Short Header{DestConnectionID: da98d8ce, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 client -> Sending packet 2 (29 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: da98d8ce, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 768.323µs} 2025/04/30 11:03:56 client <- Reading packet 2 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 440µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client Peer doesn't await address validation any longer. 2025/04/30 11:03:56 client newly acked packets (2): [0 1] 2025/04/30 11:03:56 client Canceling loss detection timer. 2025/04/30 11:03:56 client Dropping Handshake keys. 2025/04/30 11:03:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:56 client -> Sending packet 3 (33 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: da98d8ce, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 95.418µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:56 client -> Sending packet 4 (26 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: da98d8ce, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:56 client Connection 20866a1eba579dd18ecd1c842aeb4b closed. 2025/04/30 11:03:56 Requesting https://server4:443/hwangfgopg. 2025/04/30 11:03:56 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:56 Increased send buffer size to 14336 kiB 2025/04/30 11:03:56 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/8f269cd2cdcf594c87a31a88ce.sqlog 2025/04/30 11:03:56 client Starting new connection to server4 ([::]:56586 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8f269cd2cdcf594c87a31a88ce, version v1 2025/04/30 11:03:56 Adding connection ID (empty). 2025/04/30 11:03:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:56 client -> Sending packet 0 (1280 bytes) for connection 8f269cd2cdcf594c87a31a88ce, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 8f269cd2cdcf594c87a31a88ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:56 client -> Sending packet 1 (1280 bytes) for connection 8f269cd2cdcf594c87a31a88ce, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 8f269cd2cdcf594c87a31a88ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:56 client -> Sending packet 2 (1280 bytes) for connection 8f269cd2cdcf594c87a31a88ce, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 8f269cd2cdcf594c87a31a88ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 1: 436 bytes. Remaining: 844 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (436 bytes) for connection (empty), Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 21613a67, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 422, Version: v1} 2025/04/30 11:03:56 client Received first packet. Switching destination connection ID to: 21613a67 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:56 client newly acked packets (1): [2] 2025/04/30 11:03:56 client updated RTT: 34.727692ms (σ: 17.363846ms) 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 91 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 21613a67, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:03:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8f269cd2cdcf594c87a31a88ce, InitialSourceConnectionID: 21613a67, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xb2face9f05b69bea5c2b324708ec8b61} 2025/04/30 11:03:56 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e21f1da4, StatelessResetToken: 0x1a99afae821de7d91a32eedb48f498ac} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ffde4c3d, StatelessResetToken: 0x622a6e723f49b6e4677170a519cdab4b} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8862a0fe, StatelessResetToken: 0x636bf435c0e3c1a786eefbd4f3eef567} 2025/04/30 11:03:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8f269cd2cdcf594c87a31a88ce 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 8862a0fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: 8862a0fe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8862a0fe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 client Dropping Initial keys. 2025/04/30 11:03:56 client -> Sending packet 1 (36 bytes) for connection 8f269cd2cdcf594c87a31a88ce, Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: 8862a0fe, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client -> Sending packet 1 (29 bytes) for connection 8f269cd2cdcf594c87a31a88ce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8862a0fe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 849.213µs} 2025/04/30 11:03:56 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 11:03:56 client Peer doesn't await address validation any longer. 2025/04/30 11:03:56 client newly acked packets (1): [0] 2025/04/30 11:03:56 client updated RTT: 34.429ms (σ: 13.617ms) 2025/04/30 11:03:56 client Canceling loss detection timer. 2025/04/30 11:03:56 client Dropping Handshake keys. 2025/04/30 11:03:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 client <- &wire.NewTokenFrame{Token: 0x95ccfc45be1393822d29d7187a97cc5ba4eb85ffbd246bb691a0d2ea31025df87a332139751659543c8dbd37e8585e2d393afe69d395e2dbd6595dde9d2de040dc2c6825ea26f04e2b690d10b3a083cf8dfcc6b38b06} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:56 client -> Sending packet 2 (31 bytes) for connection 8f269cd2cdcf594c87a31a88ce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8862a0fe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 61.775µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:56 client -> Sending packet 3 (26 bytes) for connection 8f269cd2cdcf594c87a31a88ce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8862a0fe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:56 client Connection 8f269cd2cdcf594c87a31a88ce closed. 2025/04/30 11:03:56 Requesting https://server4:443/pvrxqgboht. 2025/04/30 11:03:56 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:56 Increased send buffer size to 14336 kiB 2025/04/30 11:03:56 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/39567dd5221aa0ced18aac6edae9713119833f.sqlog 2025/04/30 11:03:56 client Starting new connection to server4 ([::]:42006 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 39567dd5221aa0ced18aac6edae9713119833f, version v1 2025/04/30 11:03:56 Adding connection ID (empty). 2025/04/30 11:03:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:56 client -> Sending packet 0 (1280 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 39567dd5221aa0ced18aac6edae9713119833f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 1: 440 bytes. Remaining: 840 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (440 bytes) for connection (empty), Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d95540b6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 426, Version: v1} 2025/04/30 11:03:56 client Received first packet. Switching destination connection ID to: d95540b6 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client newly acked packets (1): [0] 2025/04/30 11:03:56 client updated RTT: 33.564323ms (σ: 16.782161ms) 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 91 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (749 bytes) for connection (empty), Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d95540b6, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 11:03:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 39567dd5221aa0ced18aac6edae9713119833f, InitialSourceConnectionID: d95540b6, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf328381630b5b164e2b430cc17907ffc} 2025/04/30 11:03:56 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be8e33d, StatelessResetToken: 0x86b2c747f6dfb3e3750ad24e40587aaf} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8d6e31a, StatelessResetToken: 0x5fad0b92f475e2ea4ea04e805b931040} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b122859, StatelessResetToken: 0x1ff4481fe5dc6e44575e996602458d42} 2025/04/30 11:03:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: 8be8e33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: 8be8e33d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8be8e33d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 client Dropping Initial keys. 2025/04/30 11:03:56 client -> Sending packet 1 (78 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: 8be8e33d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8be8e33d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 client -> Sending packet 2 (29 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8be8e33d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.040801ms} 2025/04/30 11:03:56 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 11:03:56 client Peer doesn't await address validation any longer. 2025/04/30 11:03:56 client newly acked packets (2): [0 1] 2025/04/30 11:03:56 client updated RTT: 33.406ms (σ: 12.901ms) 2025/04/30 11:03:56 client Canceling loss detection timer. 2025/04/30 11:03:56 client Dropping Handshake keys. 2025/04/30 11:03:56 client <- &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:03:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:56 client -> Sending packet 3 (31 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8be8e33d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 190.153µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:03:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:56 client -> Sending packet 4 (26 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: 8be8e33d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:56 client Connection 39567dd5221aa0ced18aac6edae9713119833f closed. 2025/04/30 11:03:56 Requesting https://server4:443/hfdgrinrpk. 2025/04/30 11:03:56 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:56 Increased send buffer size to 14336 kiB 2025/04/30 11:03:56 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/b9607d3b15b8b7c8533b.sqlog 2025/04/30 11:03:56 client Starting new connection to server4 ([::]:42513 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b9607d3b15b8b7c8533b, version v1 2025/04/30 11:03:56 Adding connection ID (empty). 2025/04/30 11:03:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:56 client -> Sending packet 0 (1280 bytes) for connection b9607d3b15b8b7c8533b, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: b9607d3b15b8b7c8533b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 1: 448 bytes. Remaining: 832 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (448 bytes) for connection (empty), Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffab97a8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:03:56 client Received first packet. Switching destination connection ID to: ffab97a8 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client newly acked packets (1): [0] 2025/04/30 11:03:56 client updated RTT: 33.369403ms (σ: 16.684701ms) 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Parsed a coalesced packet. Part 2: 741 bytes. Remaining: 91 bytes. 2025/04/30 11:03:56 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffab97a8, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:03:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b9607d3b15b8b7c8533b, InitialSourceConnectionID: ffab97a8, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x084cab45266da2a5ffac271a4bbbff9d} 2025/04/30 11:03:56 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f991ea3a, StatelessResetToken: 0xce0f0dc66ecbd95813052a654bf4b55a} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d15daed, StatelessResetToken: 0x4a5681488717a277e19500bd9c4a3f28} 2025/04/30 11:03:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f1a43805, StatelessResetToken: 0x0904b7a84ad2bc0d691df14cf4bcb4d5} 2025/04/30 11:03:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b9607d3b15b8b7c8533b 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: f991ea3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: f991ea3a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 client Short Header{DestConnectionID: f991ea3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 client Dropping Initial keys. 2025/04/30 11:03:56 client -> Sending packet 1 (78 bytes) for connection b9607d3b15b8b7c8533b, Handshake 2025/04/30 11:03:56 client Long Header{Type: Handshake, DestConnectionID: f991ea3a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 client Short Header{DestConnectionID: f991ea3a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 client -> Sending packet 2 (29 bytes) for connection b9607d3b15b8b7c8533b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: f991ea3a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 753.715µs} 2025/04/30 11:03:56 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 360µs} 2025/04/30 11:03:56 client Peer doesn't await address validation any longer. 2025/04/30 11:03:56 client newly acked packets (2): [0 1] 2025/04/30 11:03:56 client updated RTT: 33.232ms (σ: 12.786ms) 2025/04/30 11:03:56 client Canceling loss detection timer. 2025/04/30 11:03:56 client Dropping Handshake keys. 2025/04/30 11:03:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 client <- &wire.NewTokenFrame{Token: 0x67b5772da688c82ab4a04ac4338c33349ff432c6d16abb6376c39671ee3ead69fe9029a3eeb39b1076f2ca4aa920d53dc13fbcb58fce4aace63bd69bc51d13a58d4d7f8aca79830d775ec7f0e875e05261419badc697} 2025/04/30 11:03:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:56 client -> Sending packet 3 (31 bytes) for connection b9607d3b15b8b7c8533b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: f991ea3a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 61.264µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:56 client -> Sending packet 4 (26 bytes) for connection b9607d3b15b8b7c8533b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 client Short Header{DestConnectionID: f991ea3a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:56 client Connection b9607d3b15b8b7c8533b closed. 2025/04/30 11:03:56 Requesting https://server4:443/fcnflvmlxx. 2025/04/30 11:03:56 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:56 Increased send buffer size to 14336 kiB 2025/04/30 11:03:56 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/aba5aca260a882f333a08623539a9c95.sqlog 2025/04/30 11:03:56 client Starting new connection to server4 ([::]:41824 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aba5aca260a882f333a08623539a9c95, version v1 2025/04/30 11:03:56 Adding connection ID (empty). 2025/04/30 11:03:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:56 client -> Sending packet 0 (1280 bytes) for connection aba5aca260a882f333a08623539a9c95, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: aba5aca260a882f333a08623539a9c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:56 client -> Sending packet 1 (1280 bytes) for connection aba5aca260a882f333a08623539a9c95, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: aba5aca260a882f333a08623539a9c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:56 client -> Sending packet 2 (1280 bytes) for connection aba5aca260a882f333a08623539a9c95, Initial 2025/04/30 11:03:56 client Long Header{Type: Initial, DestConnectionID: aba5aca260a882f333a08623539a9c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:03:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:57 client Parsed a coalesced packet. Part 1: 442 bytes. Remaining: 838 bytes. 2025/04/30 11:03:57 client <- Reading packet 0 (442 bytes) for connection (empty), Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67100921, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:03:57 client Received first packet. Switching destination connection ID to: 67100921 2025/04/30 11:03:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 91 bytes. 2025/04/30 11:03:57 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 67100921, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:03:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aba5aca260a882f333a08623539a9c95, InitialSourceConnectionID: 67100921, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc286797ac5bc056dae3549056f184819} 2025/04/30 11:03:57 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5f2168e, StatelessResetToken: 0xf3d8a76af3bba39472e15914d10e127a} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55decf46, StatelessResetToken: 0xc86d7f109fbde828439ab3197aeb8713} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b9098c3, StatelessResetToken: 0x1fb0263e8faa1a8c43d6733eb27d01b9} 2025/04/30 11:03:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:57 client <- Reading packet 1 (37 bytes) for connection (empty), Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67100921, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:57 client newly acked packets (1): [2] 2025/04/30 11:03:57 client updated RTT: 34.136298ms (σ: 17.068149ms) 2025/04/30 11:03:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aba5aca260a882f333a08623539a9c95 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: 55decf46, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:57 client Dropping Initial keys. 2025/04/30 11:03:57 client -> Sending packet 1 (78 bytes) for connection aba5aca260a882f333a08623539a9c95, Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:57 client -> Sending packet 2 (29 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 949.111µs} 2025/04/30 11:03:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 client -> Sending packet 2 (70 bytes) for connection aba5aca260a882f333a08623539a9c95, Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 client -> Sending packet 3 (70 bytes) for connection aba5aca260a882f333a08623539a9c95, Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:03:57 client -> Sending packet 4 (70 bytes) for connection aba5aca260a882f333a08623539a9c95, Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 client -> Sending packet 5 (70 bytes) for connection aba5aca260a882f333a08623539a9c95, Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b9098c3, StatelessResetToken: 0x1fb0263e8faa1a8c43d6733eb27d01b9} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55decf46, StatelessResetToken: 0xc86d7f109fbde828439ab3197aeb8713} 2025/04/30 11:03:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 client Dropping Handshake keys. 2025/04/30 11:03:57 client <- &wire.NewTokenFrame{Token: 0x81db0bbf8c00d9d680611bc56186a7212b2f5fdd198cee7b93b0ad535d3dc757d7068a7d5d4a20c1faa47f65d8cc044b3e46a4bc341c244394a34e3d98e0bf94f5b1a57306dde875ae9e4d0b67ce5c3dba0bedfc7fa0} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5f2168e, StatelessResetToken: 0xf3d8a76af3bba39472e15914d10e127a} 2025/04/30 11:03:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 client -> Sending packet 4 (35 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 220.271µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:57 client Skipping packet number 3 2025/04/30 11:03:57 client -> Sending packet 5 (42 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:57 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55decf46, StatelessResetToken: 0xc86d7f109fbde828439ab3197aeb8713} 2025/04/30 11:03:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5f2168e, StatelessResetToken: 0xf3d8a76af3bba39472e15914d10e127a} 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b9098c3, StatelessResetToken: 0x1fb0263e8faa1a8c43d6733eb27d01b9} 2025/04/30 11:03:57 client <- &wire.NewTokenFrame{Token: 0x81db0bbf8c00d9d680611bc56186a7212b2f5fdd198cee7b93b0ad535d3dc757d7068a7d5d4a20c1faa47f65d8cc044b3e46a4bc341c244394a34e3d98e0bf94f5b1a57306dde875ae9e4d0b67ce5c3dba0bedfc7fa0} 2025/04/30 11:03:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:57 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 308.68ms} 2025/04/30 11:03:57 client Sending ACK because the ACK timer expired. 2025/04/30 11:03:57 client -> Sending packet 6 (34 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.254599ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client newly acked packets (1): [5] 2025/04/30 11:03:57 client updated RTT: 33.73ms (σ: 13.612ms) 2025/04/30 11:03:57 client ECN capability confirmed. 2025/04/30 11:03:57 client setting loss timer for packet 4 (1-RTT) to 37.94625ms (in 2025-04-30 11:03:57.409055223 +0000 UTC m=+1.927968630) 2025/04/30 11:03:57 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:03:57.409055223 +0000 UTC m=+1.927968630 2025/04/30 11:03:57 client lost packet 4 (time threshold) 2025/04/30 11:03:57 client Canceling loss detection timer. 2025/04/30 11:03:57 client -> Sending packet 7 (25 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:57 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:57 client -> Sending packet 8 (37 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 96.841µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:57 client -> Sending packet 9 (26 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: 55decf46, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:57 client Connection aba5aca260a882f333a08623539a9c95 closed. 2025/04/30 11:03:57 Requesting https://server4:443/dpghiztsjk. 2025/04/30 11:03:57 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:57 Increased send buffer size to 14336 kiB 2025/04/30 11:03:57 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:57 Created qlog file: /logs/qlog/d67ee5ac708ffd47.sqlog 2025/04/30 11:03:57 client Starting new connection to server4 ([::]:36952 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d67ee5ac708ffd47, version v1 2025/04/30 11:03:57 Adding connection ID (empty). 2025/04/30 11:03:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:57 client -> Sending packet 0 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: d67ee5ac708ffd47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:03:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 client -> Sending packet 1 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: d67ee5ac708ffd47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:03:57 client -> Sending packet 2 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: d67ee5ac708ffd47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:03:57 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7c00879, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:57 client Received first packet. Switching destination connection ID to: c7c00879 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client -> Sending packet 3 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: c7c00879, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:57 client <- Reading packet 2 (744 bytes) for connection (empty), Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c7c00879, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:03:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d67ee5ac708ffd47, InitialSourceConnectionID: c7c00879, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x6592ba3ae5fcd063fc524631c8078253} 2025/04/30 11:03:57 client -> Sending packet 0 (75 bytes) for connection d67ee5ac708ffd47, Handshake 2025/04/30 11:03:57 client Long Header{Type: Handshake, DestConnectionID: c7c00879, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 client Dropping Initial keys. 2025/04/30 11:03:57 client -> Sending packet 0 (42 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: c7c00879, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:57 client <- Reading packet 2 (331 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client Peer doesn't await address validation any longer. 2025/04/30 11:03:57 client newly acked packets (1): [0] 2025/04/30 11:03:57 client updated RTT: 31.397218ms (σ: 15.698609ms) 2025/04/30 11:03:57 client ECN capability confirmed. 2025/04/30 11:03:57 client Canceling loss detection timer. 2025/04/30 11:03:57 client Dropping Handshake keys. 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 client <- &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:57 client -> Sending packet 1 (33 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: a941edda, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 206.766µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:57 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:57 client -> Sending packet 2 (33 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: a941edda, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 61.324µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:57 client -> Sending packet 3 (26 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 client Short Header{DestConnectionID: a941edda, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:57 client Connection d67ee5ac708ffd47 closed. 2025/04/30 11:03:57 Requesting https://server4:443/suckhndyxv. 2025/04/30 11:03:57 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:57 Increased send buffer size to 14336 kiB 2025/04/30 11:03:57 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:57 Created qlog file: /logs/qlog/59994b531dd076da.sqlog 2025/04/30 11:03:57 client Starting new connection to server4 ([::]:57582 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 59994b531dd076da, version v1 2025/04/30 11:03:57 Adding connection ID (empty). 2025/04/30 11:03:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:57 client -> Sending packet 0 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:57 client Long Header{Type: Initial, DestConnectionID: 59994b531dd076da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 client -> Sending packet 1 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 59994b531dd076da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:58 client -> Sending packet 2 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 59994b531dd076da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:58 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34f1db42, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 client Received first packet. Switching destination connection ID to: 34f1db42 2025/04/30 11:03:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client -> Sending packet 3 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 34f1db42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34f1db42, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 client -> Sending packet 4 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 34f1db42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 client <- Reading packet 1 (733 bytes) for connection (empty), Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f1db42, PacketNumber: 1, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:03:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 59994b531dd076da, InitialSourceConnectionID: 34f1db42, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf3d3dfb3ad2b9104216cc4202024e73a} 2025/04/30 11:03:58 client -> Sending packet 0 (75 bytes) for connection 59994b531dd076da, Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 34f1db42, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:58 client Dropping Initial keys. 2025/04/30 11:03:58 client -> Sending packet 0 (42 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 34f1db42, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:58 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 client Dropping Handshake keys. 2025/04/30 11:03:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5aeb7e1, StatelessResetToken: 0x4cd090529058da9db99a8b16051b7182} 2025/04/30 11:03:58 client <- &wire.NewTokenFrame{Token: 0x9cdceeeb543578d0abdf1923c116df65a1f4ffa8858d080602059215edc030e4afd1386e2a03fd0d7e70e54d068f0fb52af5304686957c36b5751de2c1c46c53422a338b2722f7f817d213771e70e56a745df73dca0d} 2025/04/30 11:03:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7dffab58, StatelessResetToken: 0xa01ccf37a8f49872646c8dbbeab21502} 2025/04/30 11:03:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1234b61c, StatelessResetToken: 0xc9904a783cfef5fc0d15068ed1cbc814} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:58 client -> Sending packet 1 (1366 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 7dffab58, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.PingFrame{} 2025/04/30 11:03:58 client -> Sending packet 2 (33 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 7dffab58, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 192.97µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:58 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 88µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:58 client newly acked packets (3): [0 1 2] 2025/04/30 11:03:58 client updated RTT: 31.828819ms (σ: 15.914409ms) 2025/04/30 11:03:58 client ECN capability confirmed. 2025/04/30 11:03:58 client Canceling loss detection timer. 2025/04/30 11:03:58 client Ignoring all packets below 4. 2025/04/30 11:03:58 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:58 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:58 client -> Sending packet 3 (33 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 7dffab58, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 80.04µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:58 client -> Sending packet 4 (26 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 7dffab58, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:58 client Connection 59994b531dd076da closed. 2025/04/30 11:03:58 Requesting https://server4:443/yeofzovzxe. 2025/04/30 11:03:58 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:58 Increased send buffer size to 14336 kiB 2025/04/30 11:03:58 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:58 Created qlog file: /logs/qlog/f908be740ec22be506c1f812ab37e5adf589d274.sqlog 2025/04/30 11:03:58 client Starting new connection to server4 ([::]:49833 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f908be740ec22be506c1f812ab37e5adf589d274, version v1 2025/04/30 11:03:58 Adding connection ID (empty). 2025/04/30 11:03:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:58 client -> Sending packet 0 (1280 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: f908be740ec22be506c1f812ab37e5adf589d274, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:03:58 client Parsed a coalesced packet. Part 1: 437 bytes. Remaining: 843 bytes. 2025/04/30 11:03:58 client <- Reading packet 0 (437 bytes) for connection (empty), Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dfed28f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 423, Version: v1} 2025/04/30 11:03:58 client Received first packet. Switching destination connection ID to: 9dfed28f 2025/04/30 11:03:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 client newly acked packets (1): [0] 2025/04/30 11:03:58 client updated RTT: 33.522845ms (σ: 16.761422ms) 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Parsed a coalesced packet. Part 2: 752 bytes. Remaining: 91 bytes. 2025/04/30 11:03:58 client <- Reading packet 0 (752 bytes) for connection (empty), Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dfed28f, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:03:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f908be740ec22be506c1f812ab37e5adf589d274, InitialSourceConnectionID: 9dfed28f, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xb1c22707984405c116868c862544f19a} 2025/04/30 11:03:58 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:58 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaf109ae, StatelessResetToken: 0xb02ac14634b96e4fdeb712e958e26e2e} 2025/04/30 11:03:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f85c12bd, StatelessResetToken: 0xce8c5eecd9630f243fec4b712af7d360} 2025/04/30 11:03:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8428fff6, StatelessResetToken: 0xc13ce3ad0f39cf7310adc8d5c3293e0d} 2025/04/30 11:03:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 8428fff6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 8428fff6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:58 client Short Header{DestConnectionID: 8428fff6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:58 client Dropping Initial keys. 2025/04/30 11:03:58 client -> Sending packet 1 (78 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 8428fff6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 client Short Header{DestConnectionID: 8428fff6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:58 client -> Sending packet 2 (29 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 8428fff6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 728.559µs} 2025/04/30 11:03:58 client <- Reading packet 2 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 424µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 client Peer doesn't await address validation any longer. 2025/04/30 11:03:58 client newly acked packets (2): [0 1] 2025/04/30 11:03:58 client Canceling loss detection timer. 2025/04/30 11:03:58 client Dropping Handshake keys. 2025/04/30 11:03:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:58 client -> Sending packet 3 (33 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 8428fff6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 109.194µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:58 client -> Sending packet 4 (26 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 8428fff6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:58 client Connection f908be740ec22be506c1f812ab37e5adf589d274 closed. 2025/04/30 11:03:58 Requesting https://server4:443/wdqoiylgsm. 2025/04/30 11:03:58 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:58 Increased send buffer size to 14336 kiB 2025/04/30 11:03:58 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:58 Created qlog file: /logs/qlog/5c706d7fcb8a3a075cea75f5d3.sqlog 2025/04/30 11:03:58 client Starting new connection to server4 ([::]:52981 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5c706d7fcb8a3a075cea75f5d3, version v1 2025/04/30 11:03:58 Adding connection ID (empty). 2025/04/30 11:03:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:58 client -> Sending packet 0 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 5c706d7fcb8a3a075cea75f5d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:03:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 client -> Sending packet 1 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 5c706d7fcb8a3a075cea75f5d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:03:58 client -> Sending packet 2 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 5c706d7fcb8a3a075cea75f5d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:03:58 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90be1d07, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 client Received first packet. Switching destination connection ID to: 90be1d07 2025/04/30 11:03:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client -> Sending packet 3 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: 90be1d07, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 client <- Reading packet 3 (37 bytes) for connection (empty), Initial 2025/04/30 11:03:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90be1d07, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:58 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 client newly acked packets (1): [2] 2025/04/30 11:03:58 client updated RTT: 34.055627ms (σ: 17.027813ms) 2025/04/30 11:03:58 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90be1d07, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5c706d7fcb8a3a075cea75f5d3, InitialSourceConnectionID: 90be1d07, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc0e9a46cad58fe270afab7ee7d3d5993} 2025/04/30 11:03:58 client -> Sending packet 0 (75 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 90be1d07, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:58 client Dropping Initial keys. 2025/04/30 11:03:58 client -> Sending packet 0 (42 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 client Short Header{DestConnectionID: 90be1d07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:58 client <- Reading packet 2 (748 bytes) for connection (empty), Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90be1d07, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:58 client -> Sending packet 1 (36 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 90be1d07, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 client -> Sending packet 2 (70 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 90be1d07, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:58 client -> Sending packet 3 (70 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Handshake 2025/04/30 11:03:58 client Long Header{Type: Handshake, DestConnectionID: 90be1d07, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b4d78ba, StatelessResetToken: 0xdb3308c74748da0cd7f32e0e9d0dfaee} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc1d8ee7, StatelessResetToken: 0xa010af9ad0a5e8e461638fed484ac60a} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43285caf, StatelessResetToken: 0x6b38569af259718ade093470258f8e29} 2025/04/30 11:03:59 client <- &wire.NewTokenFrame{Token: 0xc4aaaa4fe593f27209c63f62cbc4a47c74b0690d0a6b14f5cd49d06badfb5488d4fff8d19db5cd13e97cbcb835b3563c58b2e3d72d321a9afc2d0c5cc085b08f6940eea5583b2b8ca43524dc4272716f4f10b24a90a3} 2025/04/30 11:03:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 client Dropping Handshake keys. 2025/04/30 11:03:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 client -> Sending packet 2 (52 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 163.064µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 client -> Sending packet 3 (44 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc1d8ee7, StatelessResetToken: 0xa010af9ad0a5e8e461638fed484ac60a} 2025/04/30 11:03:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 client <- &wire.NewTokenFrame{Token: 0xc4aaaa4fe593f27209c63f62cbc4a47c74b0690d0a6b14f5cd49d06badfb5488d4fff8d19db5cd13e97cbcb835b3563c58b2e3d72d321a9afc2d0c5cc085b08f6940eea5583b2b8ca43524dc4272716f4f10b24a90a3} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b4d78ba, StatelessResetToken: 0xdb3308c74748da0cd7f32e0e9d0dfaee} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43285caf, StatelessResetToken: 0x6b38569af259718ade093470258f8e29} 2025/04/30 11:03:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.08ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:59 client -> Sending packet 4 (31 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 126.106µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:59 client -> Sending packet 5 (26 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:59 client Connection 5c706d7fcb8a3a075cea75f5d3 closed. 2025/04/30 11:03:59 Requesting https://server4:443/xzqnujdyco. 2025/04/30 11:03:59 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:59 Increased send buffer size to 14336 kiB 2025/04/30 11:03:59 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:59 Created qlog file: /logs/qlog/5b1c333a32e6b2269ec7eba8af35b8.sqlog 2025/04/30 11:03:59 client Starting new connection to server4 ([::]:39856 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5b1c333a32e6b2269ec7eba8af35b8, version v1 2025/04/30 11:03:59 Adding connection ID (empty). 2025/04/30 11:03:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:59 client -> Sending packet 0 (1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: 5b1c333a32e6b2269ec7eba8af35b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 client -> Sending packet 1 (1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: 5b1c333a32e6b2269ec7eba8af35b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:59 client -> Sending packet 2 (1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: 5b1c333a32e6b2269ec7eba8af35b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:59 client Parsed a coalesced packet. Part 1: 438 bytes. Remaining: 842 bytes. 2025/04/30 11:03:59 client <- Reading packet 0 (438 bytes) for connection (empty), Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c13f762, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 424, Version: v1} 2025/04/30 11:03:59 client Received first packet. Switching destination connection ID to: 2c13f762 2025/04/30 11:03:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 91 bytes. 2025/04/30 11:03:59 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c13f762, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 11:03:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5b1c333a32e6b2269ec7eba8af35b8, InitialSourceConnectionID: 2c13f762, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe91b0af9378438aabc57af3d4770e054} 2025/04/30 11:03:59 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65671eca, StatelessResetToken: 0xa046bd9d090aafef5ff1a9c45968ffdf} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 768acd7a, StatelessResetToken: 0xcb62a3c58f61569b51a15a17287488b0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5ab06ae, StatelessResetToken: 0x73da0a39677e668c94fb14222f366914} 2025/04/30 11:03:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: 65671eca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: 65671eca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 client Dropping Initial keys. 2025/04/30 11:03:59 client Dropping %!s(logging.PacketType=0) packet (37 bytes) because we already dropped the keys. 2025/04/30 11:03:59 client -> Sending packet 1 (36 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Handshake 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: 65671eca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 client -> Sending packet 1 (29 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 766.329µs} 2025/04/30 11:03:59 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 11:03:59 client Peer doesn't await address validation any longer. 2025/04/30 11:03:59 client newly acked packets (1): [0] 2025/04/30 11:03:59 client updated RTT: 32.409923ms (σ: 16.204961ms) 2025/04/30 11:03:59 client Canceling loss detection timer. 2025/04/30 11:03:59 client Dropping Handshake keys. 2025/04/30 11:03:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 client <- &wire.NewTokenFrame{Token: 0x40e5aff58cbff03f328dc40d0348a626e2d55b05773fd036ad4b2f5cb684e94968bbfcb7ebb7720c5d3d8eaffba072f358e99d07e20c9ae0275337865039f2c93694c0c257624b9095a68972c11cd58f709abc9e3c38} 2025/04/30 11:03:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 client Sending ACK because the ACK timer expired. 2025/04/30 11:03:59 client -> Sending packet 2 (32 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.383751ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 4 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 768acd7a, StatelessResetToken: 0xcb62a3c58f61569b51a15a17287488b0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5ab06ae, StatelessResetToken: 0x73da0a39677e668c94fb14222f366914} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65671eca, StatelessResetToken: 0xa046bd9d090aafef5ff1a9c45968ffdf} 2025/04/30 11:03:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 client -> Sending packet 3 (33 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 80.961µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 5 (251 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 client <- &wire.NewTokenFrame{Token: 0x40e5aff58cbff03f328dc40d0348a626e2d55b05773fd036ad4b2f5cb684e94968bbfcb7ebb7720c5d3d8eaffba072f358e99d07e20c9ae0275337865039f2c93694c0c257624b9095a68972c11cd58f709abc9e3c38} 2025/04/30 11:03:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 client Sending ACK because the ACK timer expired. 2025/04/30 11:03:59 client -> Sending packet 4 (34 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 25.259796ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 7 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.PingFrame{} 2025/04/30 11:03:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 client -> Sending packet 5 (1366 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.PingFrame{} 2025/04/30 11:03:59 client -> Sending packet 6 (35 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 114.533µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:59 client -> Sending packet 7 (26 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 65671eca, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:59 client Connection 5b1c333a32e6b2269ec7eba8af35b8 closed. 2025/04/30 11:03:59 Requesting https://server4:443/lkmecvgcbg. 2025/04/30 11:03:59 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:59 Increased send buffer size to 14336 kiB 2025/04/30 11:03:59 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:59 Created qlog file: /logs/qlog/c42cc020e7d7eb5f144813c50b91666675.sqlog 2025/04/30 11:03:59 client Starting new connection to server4 ([::]:48584 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c42cc020e7d7eb5f144813c50b91666675, version v1 2025/04/30 11:03:59 Adding connection ID (empty). 2025/04/30 11:03:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:59 client -> Sending packet 0 (1280 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: c42cc020e7d7eb5f144813c50b91666675, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:03:59 client Parsed a coalesced packet. Part 1: 435 bytes. Remaining: 845 bytes. 2025/04/30 11:03:59 client <- Reading packet 0 (435 bytes) for connection (empty), Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bce00a68, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 421, Version: v1} 2025/04/30 11:03:59 client Received first packet. Switching destination connection ID to: bce00a68 2025/04/30 11:03:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 client newly acked packets (1): [0] 2025/04/30 11:03:59 client updated RTT: 33.383042ms (σ: 16.691521ms) 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Parsed a coalesced packet. Part 2: 754 bytes. Remaining: 91 bytes. 2025/04/30 11:03:59 client <- Reading packet 0 (754 bytes) for connection (empty), Handshake 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bce00a68, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:03:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c42cc020e7d7eb5f144813c50b91666675, InitialSourceConnectionID: bce00a68, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x97b80d3b68f4209ee1544f953b11e2d3} 2025/04/30 11:03:59 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f81316b, StatelessResetToken: 0x8ddf9d8f08323bee64eb668e1e289f85} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8674b766, StatelessResetToken: 0xa78626ce0115a9625468c53011275550} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaa65bec, StatelessResetToken: 0x7b32b1c37c8d21a46e34a48a85bc598b} 2025/04/30 11:03:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c42cc020e7d7eb5f144813c50b91666675 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: 8674b766, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: 8674b766, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 client Dropping Initial keys. 2025/04/30 11:03:59 client -> Sending packet 1 (78 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, Handshake 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: 8674b766, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 client -> Sending packet 2 (29 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 758.294µs} 2025/04/30 11:03:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 client -> Sending packet 2 (70 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, Handshake 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: 8674b766, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 client -> Sending packet 3 (70 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, Handshake 2025/04/30 11:03:59 client Long Header{Type: Handshake, DestConnectionID: 8674b766, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 client <- Reading packet 3 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8674b766, StatelessResetToken: 0xa78626ce0115a9625468c53011275550} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaa65bec, StatelessResetToken: 0x7b32b1c37c8d21a46e34a48a85bc598b} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f81316b, StatelessResetToken: 0x8ddf9d8f08323bee64eb668e1e289f85} 2025/04/30 11:03:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 client -> Sending packet 3 (33 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 88.475µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 4 (251 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 client Dropping Handshake keys. 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 client <- &wire.NewTokenFrame{Token: 0xbd88ae9918c3ec28a388be932e9139c509990d41a2ca0d69c4a6f380853093dfc5f8c4729bf7cd86fa56cd750131fb888f54b638e42900709c838e549f9b79c09c0420bac3dbbee9a480f6879d88aa4170ad156e7def} 2025/04/30 11:03:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 client -> Sending packet 5 (35 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 76.823µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 client Skipping packet number 4 2025/04/30 11:03:59 client -> Sending packet 6 (42 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:03:59 client -> Sending packet 8 (25 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 client Skipping packet number 7 2025/04/30 11:03:59 client -> Sending packet 9 (42 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 client -> Sending packet 10 (1366 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.PingFrame{} 2025/04/30 11:03:59 client <- Reading packet 6 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8674b766, StatelessResetToken: 0xa78626ce0115a9625468c53011275550} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaa65bec, StatelessResetToken: 0x7b32b1c37c8d21a46e34a48a85bc598b} 2025/04/30 11:03:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f81316b, StatelessResetToken: 0x8ddf9d8f08323bee64eb668e1e289f85} 2025/04/30 11:03:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 client -> Sending packet 11 (35 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 101.229µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 7 (251 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 client <- &wire.NewTokenFrame{Token: 0xbd88ae9918c3ec28a388be932e9139c509990d41a2ca0d69c4a6f380853093dfc5f8c4729bf7cd86fa56cd750131fb888f54b638e42900709c838e549f9b79c09c0420bac3dbbee9a480f6879d88aa4170ad156e7def} 2025/04/30 11:03:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 client <- Reading packet 8 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.PingFrame{} 2025/04/30 11:03:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:59 client -> Sending packet 12 (35 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 105.343µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client <- Reading packet 10 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:03:59 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 client -> Sending packet 13 (37 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 64.741µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:03:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:03:59 client -> Sending packet 14 (26 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: Not-ECT) 2025/04/30 11:03:59 client Short Header{DestConnectionID: 8674b766, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:03:59 client Connection c42cc020e7d7eb5f144813c50b91666675 closed. 2025/04/30 11:03:59 Requesting https://server4:443/ykemmazoey. 2025/04/30 11:03:59 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:59 Increased send buffer size to 14336 kiB 2025/04/30 11:03:59 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:59 Created qlog file: /logs/qlog/23d0d3cddf0ff9c2b25a5164bcd9b529c3da.sqlog 2025/04/30 11:03:59 client Starting new connection to server4 ([::]:55098 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, version v1 2025/04/30 11:03:59 Adding connection ID (empty). 2025/04/30 11:03:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:03:59 client -> Sending packet 0 (1280 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, Initial 2025/04/30 11:03:59 client Long Header{Type: Initial, DestConnectionID: 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:03:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:00 client Parsed a coalesced packet. Part 1: 441 bytes. Remaining: 839 bytes. 2025/04/30 11:04:00 client <- Reading packet 0 (441 bytes) for connection (empty), Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a599647, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:04:00 client Received first packet. Switching destination connection ID to: 4a599647 2025/04/30 11:04:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client newly acked packets (1): [0] 2025/04/30 11:04:00 client updated RTT: 34.387461ms (σ: 17.19373ms) 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 91 bytes. 2025/04/30 11:04:00 client <- Reading packet 0 (748 bytes) for connection (empty), Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4a599647, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, InitialSourceConnectionID: 4a599647, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa517d855f7ff5a2808ac15ae5e861885} 2025/04/30 11:04:00 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fe67f78, StatelessResetToken: 0xcb1105e33808f48e29289fd4ffb5d66e} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 106023b7, StatelessResetToken: 0x713c3137442021b446ffc6f74dc6cf8e} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40b8b6a8, StatelessResetToken: 0x59745dba5507dd3189ae346147639dc0} 2025/04/30 11:04:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client Short Header{DestConnectionID: 4fe67f78, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 client Dropping Initial keys. 2025/04/30 11:04:00 client -> Sending packet 1 (36 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client -> Sending packet 1 (29 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 4fe67f78, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 967.847µs} 2025/04/30 11:04:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 client -> Sending packet 2 (70 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client -> Sending packet 3 (70 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client <- Reading packet 4 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fe67f78, StatelessResetToken: 0xcb1105e33808f48e29289fd4ffb5d66e} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 106023b7, StatelessResetToken: 0x713c3137442021b446ffc6f74dc6cf8e} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40b8b6a8, StatelessResetToken: 0x59745dba5507dd3189ae346147639dc0} 2025/04/30 11:04:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:00 client -> Sending packet 2 (33 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 4fe67f78, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 88.545µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:00 client -> Sending packet 3 (35 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 4fe67f78, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 84.478µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:00 client -> Sending packet 4 (61 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:04:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:00 client Short Header{DestConnectionID: 4fe67f78, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:00 client Connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da closed. 2025/04/30 11:04:00 Requesting https://server4:443/hrndujivqs. 2025/04/30 11:04:00 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:00 Increased send buffer size to 14336 kiB 2025/04/30 11:04:00 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/917a91516493bd0ee1806e20e028bf7d7db271.sqlog 2025/04/30 11:04:00 client Starting new connection to server4 ([::]:58376 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 917a91516493bd0ee1806e20e028bf7d7db271, version v1 2025/04/30 11:04:00 Adding connection ID (empty). 2025/04/30 11:04:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:00 client -> Sending packet 0 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 client -> Sending packet 1 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:00 client -> Sending packet 2 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:00 client <- Reading packet 1 (37 bytes) for connection (empty), Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:00 client Received first packet. Switching destination connection ID to: f6c249cb 2025/04/30 11:04:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client newly acked packets (1): [2] 2025/04/30 11:04:00 client updated RTT: 33.907072ms (σ: 16.953536ms) 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client -> Sending packet 3 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: f6c249cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:00 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 client -> Sending packet 4 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: f6c249cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:00 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6c249cb, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, InitialSourceConnectionID: f6c249cb, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x37a6e6531faabc768f2d5faf7f544187} 2025/04/30 11:04:00 client -> Sending packet 0 (75 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: f6c249cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client Dropping Initial keys. 2025/04/30 11:04:00 client -> Sending packet 0 (42 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: f6c249cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 client -> Sending packet 1 (70 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: f6c249cb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client -> Sending packet 2 (70 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: f6c249cb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 client Dropping Handshake keys. 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4f3607f, StatelessResetToken: 0x8793e6ebc66b8b7677b70f7441b027c9} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 client <- &wire.NewTokenFrame{Token: 0x370f27667d73c7dcdc196e81ab0be93b5d37d0a79bb2270aafc93e9963fb9284b0d2c2fd20d27e4220d36948a1785c817ab67aa0ef34138249073dc16a7f1e2c81f35660187218a8ea357f8b039ca6d71ab4f38299c4} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b9f0ff4, StatelessResetToken: 0x724103faa2fc03afb061b68b9b50ffd5} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bf1919c, StatelessResetToken: 0xf53492068e9193743395553d90242672} 2025/04/30 11:04:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 client -> Sending packet 2 (52 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: e4f3607f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 153.035µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 client -> Sending packet 3 (44 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: e4f3607f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 client <- &wire.NewTokenFrame{Token: 0x370f27667d73c7dcdc196e81ab0be93b5d37d0a79bb2270aafc93e9963fb9284b0d2c2fd20d27e4220d36948a1785c817ab67aa0ef34138249073dc16a7f1e2c81f35660187218a8ea357f8b039ca6d71ab4f38299c4} 2025/04/30 11:04:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bf1919c, StatelessResetToken: 0xf53492068e9193743395553d90242672} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4f3607f, StatelessResetToken: 0x8793e6ebc66b8b7677b70f7441b027c9} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b9f0ff4, StatelessResetToken: 0x724103faa2fc03afb061b68b9b50ffd5} 2025/04/30 11:04:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:00 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:00 client -> Sending packet 4 (33 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: e4f3607f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 57.377µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:00 client -> Sending packet 5 (26 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: e4f3607f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:00 client Connection 917a91516493bd0ee1806e20e028bf7d7db271 closed. 2025/04/30 11:04:00 Requesting https://server4:443/tixbihnvis. 2025/04/30 11:04:00 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:00 Increased send buffer size to 14336 kiB 2025/04/30 11:04:00 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/3ef79d885f1aff45a5.sqlog 2025/04/30 11:04:00 client Starting new connection to server4 ([::]:46166 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3ef79d885f1aff45a5, version v1 2025/04/30 11:04:00 Adding connection ID (empty). 2025/04/30 11:04:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:00 client -> Sending packet 0 (1280 bytes) for connection 3ef79d885f1aff45a5, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 3ef79d885f1aff45a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:04:00 client Parsed a coalesced packet. Part 1: 455 bytes. Remaining: 825 bytes. 2025/04/30 11:04:00 client <- Reading packet 0 (455 bytes) for connection (empty), Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3cf24690, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:04:00 client Received first packet. Switching destination connection ID to: 3cf24690 2025/04/30 11:04:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client newly acked packets (1): [0] 2025/04/30 11:04:00 client updated RTT: 33.614666ms (σ: 16.807333ms) 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Parsed a coalesced packet. Part 2: 734 bytes. Remaining: 91 bytes. 2025/04/30 11:04:00 client <- Reading packet 0 (734 bytes) for connection (empty), Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3cf24690, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:04:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3ef79d885f1aff45a5, InitialSourceConnectionID: 3cf24690, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8055dcbc4063a98655fb6305c1c28aa8} 2025/04/30 11:04:00 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b0f8115b, StatelessResetToken: 0x395ff73bdee15a2fe075ce6b6ae73673} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8924c447, StatelessResetToken: 0x5fc21c8c705a4ecbb62b1f5605c52c68} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e570113, StatelessResetToken: 0x452b5fb411b64dd6f62d413fc2b9d2a7} 2025/04/30 11:04:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ef79d885f1aff45a5 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 1e570113, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 1e570113, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 client Dropping Initial keys. 2025/04/30 11:04:00 client -> Sending packet 1 (78 bytes) for connection 3ef79d885f1aff45a5, Handshake 2025/04/30 11:04:00 client Long Header{Type: Handshake, DestConnectionID: 1e570113, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 client -> Sending packet 2 (29 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 623.333µs} 2025/04/30 11:04:00 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 360µs} 2025/04/30 11:04:00 client Peer doesn't await address validation any longer. 2025/04/30 11:04:00 client newly acked packets (2): [0 1] 2025/04/30 11:04:00 client updated RTT: 33.467ms (σ: 12.898ms) 2025/04/30 11:04:00 client Canceling loss detection timer. 2025/04/30 11:04:00 client Dropping Handshake keys. 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 client <- &wire.NewTokenFrame{Token: 0xda98638555020bce6efeefe94476dc3492e9d4ffde175397a976c91cbd9ee06ef46646b1eb5036e3e466c4a4d5c9aa9e92ec6c1b5d7a9974a74a9c3b1e15d3bb766d5ecaee60968007bc32cb1b1f28123cb347761dbb} 2025/04/30 11:04:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:00 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:00 client -> Sending packet 3 (31 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80.72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:00 client <- Reading packet 5 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b0f8115b, StatelessResetToken: 0x395ff73bdee15a2fe075ce6b6ae73673} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e570113, StatelessResetToken: 0x452b5fb411b64dd6f62d413fc2b9d2a7} 2025/04/30 11:04:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8924c447, StatelessResetToken: 0x5fc21c8c705a4ecbb62b1f5605c52c68} 2025/04/30 11:04:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:00 client -> Sending packet 4 (33 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 95.458µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client <- Reading packet 6 (251 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.NewTokenFrame{Token: 0xda98638555020bce6efeefe94476dc3492e9d4ffde175397a976c91cbd9ee06ef46646b1eb5036e3e466c4a4d5c9aa9e92ec6c1b5d7a9974a74a9c3b1e15d3bb766d5ecaee60968007bc32cb1b1f28123cb347761dbb} 2025/04/30 11:04:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:00 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:00 client -> Sending packet 5 (34 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 25.268798ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client <- Reading packet 7 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.PingFrame{} 2025/04/30 11:04:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:00 client <- Reading packet 8 (23 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:00 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:00 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:00 client -> Sending packet 6 (1366 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.PingFrame{} 2025/04/30 11:04:00 client -> Sending packet 7 (33 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 193.657µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:04:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:00 client -> Sending packet 8 (26 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 client Short Header{DestConnectionID: 1e570113, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:00 client Connection 3ef79d885f1aff45a5 closed. 2025/04/30 11:04:00 Requesting https://server4:443/kbnperyfzs. 2025/04/30 11:04:00 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:00 Increased send buffer size to 14336 kiB 2025/04/30 11:04:00 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/4cc86ef10ebe1e1333cf31992fb08fd81f.sqlog 2025/04/30 11:04:00 client Starting new connection to server4 ([::]:53414 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4cc86ef10ebe1e1333cf31992fb08fd81f, version v1 2025/04/30 11:04:00 Adding connection ID (empty). 2025/04/30 11:04:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:00 client -> Sending packet 0 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:00 client Long Header{Type: Initial, DestConnectionID: 4cc86ef10ebe1e1333cf31992fb08fd81f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 client -> Sending packet 1 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 4cc86ef10ebe1e1333cf31992fb08fd81f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:01 client -> Sending packet 2 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 4cc86ef10ebe1e1333cf31992fb08fd81f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:01 client <- Reading packet 1 (37 bytes) for connection (empty), Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31790e6e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:01 client Received first packet. Switching destination connection ID to: 31790e6e 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31790e6e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client -> Sending packet 3 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 31790e6e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:01 client <- Reading packet 1 (752 bytes) for connection (empty), Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 31790e6e, PacketNumber: 1, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:04:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4cc86ef10ebe1e1333cf31992fb08fd81f, InitialSourceConnectionID: 31790e6e, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8795ba70d0f17dafced1c37710cf8450} 2025/04/30 11:04:01 client -> Sending packet 0 (75 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: 31790e6e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 client Dropping Initial keys. 2025/04/30 11:04:01 client -> Sending packet 0 (42 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: 31790e6e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:01 client <- Reading packet 2 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf30effe, StatelessResetToken: 0xf6df9a963266e190d7aa8fe06af480e8} 2025/04/30 11:04:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 client Dropping Handshake keys. 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de71c778, StatelessResetToken: 0x0b264465f32249fbd0a6b2cdc7f811d2} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:01 client <- &wire.NewTokenFrame{Token: 0xc0b5a0adb2c11ee98e5bbbb9e8cae2bbb43a76bff8e1a4a82798409a9ea94445653673c5be1aae335e300f6eca096a1798f3dadaa19e0a50bde50a4d7b293f84e1bcabfb067a775f90a7ee826000abd6143250f66af6} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: acf62c98, StatelessResetToken: 0xb8fc320a39c40a986af415463045a271} 2025/04/30 11:04:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:01 client -> Sending packet 1 (1366 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: de71c778, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.PingFrame{} 2025/04/30 11:04:01 client -> Sending packet 2 (33 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: de71c778, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 129.13µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf30effe, StatelessResetToken: 0xf6df9a963266e190d7aa8fe06af480e8} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: acf62c98, StatelessResetToken: 0xb8fc320a39c40a986af415463045a271} 2025/04/30 11:04:01 client <- &wire.NewTokenFrame{Token: 0xc0b5a0adb2c11ee98e5bbbb9e8cae2bbb43a76bff8e1a4a82798409a9ea94445653673c5be1aae335e300f6eca096a1798f3dadaa19e0a50bde50a4d7b293f84e1bcabfb067a775f90a7ee826000abd6143250f66af6} 2025/04/30 11:04:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de71c778, StatelessResetToken: 0x0b264465f32249fbd0a6b2cdc7f811d2} 2025/04/30 11:04:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:01 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.PingFrame{} 2025/04/30 11:04:01 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:01 client -> Sending packet 3 (31 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: de71c778, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 66.203µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client newly acked packets (1): [1] 2025/04/30 11:04:01 client updated RTT: 31.742682ms (σ: 15.871341ms) 2025/04/30 11:04:01 client ECN capability confirmed. 2025/04/30 11:04:01 client lost packet 0 (time threshold) 2025/04/30 11:04:01 client -> Sending packet 4 (42 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: de71c778, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:01 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client newly acked packets (1): [4] 2025/04/30 11:04:01 client updated RTT: 31.615ms (σ: 12.156ms) 2025/04/30 11:04:01 client lost packet 2 (time threshold) 2025/04/30 11:04:01 client Canceling loss detection timer. 2025/04/30 11:04:01 client -> Sending packet 5 (25 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: de71c778, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 client <- Reading packet 7 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:01 client -> Sending packet 6 (26 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: de71c778, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:01 client Connection 4cc86ef10ebe1e1333cf31992fb08fd81f closed. 2025/04/30 11:04:01 Requesting https://server4:443/qfnrherzdu. 2025/04/30 11:04:01 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:01 Increased send buffer size to 14336 kiB 2025/04/30 11:04:01 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:01 Created qlog file: /logs/qlog/f15686a4bb087d195aa53accedb2.sqlog 2025/04/30 11:04:01 client Starting new connection to server4 ([::]:35249 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f15686a4bb087d195aa53accedb2, version v1 2025/04/30 11:04:01 Adding connection ID (empty). 2025/04/30 11:04:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:01 client -> Sending packet 0 (1280 bytes) for connection f15686a4bb087d195aa53accedb2, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: f15686a4bb087d195aa53accedb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:01 client Parsed a coalesced packet. Part 1: 438 bytes. Remaining: 842 bytes. 2025/04/30 11:04:01 client <- Reading packet 0 (438 bytes) for connection (empty), Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5754677b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 424, Version: v1} 2025/04/30 11:04:01 client Received first packet. Switching destination connection ID to: 5754677b 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client newly acked packets (1): [0] 2025/04/30 11:04:01 client updated RTT: 33.493055ms (σ: 16.746527ms) 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 91 bytes. 2025/04/30 11:04:01 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5754677b, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 11:04:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f15686a4bb087d195aa53accedb2, InitialSourceConnectionID: 5754677b, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x2c1c733f9a22df7767f4353ea05ed0d9} 2025/04/30 11:04:01 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3048a2c1, StatelessResetToken: 0x88c6942cfa8810f6ce25271df90f9e09} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d6aea0a, StatelessResetToken: 0xa855ce7c7ce1e737c1a2bc333a72a5ba} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcbe7378, StatelessResetToken: 0xa30861a8df25f7905c958545eb778650} 2025/04/30 11:04:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f15686a4bb087d195aa53accedb2 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 4d6aea0a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: 4d6aea0a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 client Short Header{DestConnectionID: 4d6aea0a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 client Dropping Initial keys. 2025/04/30 11:04:01 client -> Sending packet 1 (36 bytes) for connection f15686a4bb087d195aa53accedb2, Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: 4d6aea0a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client -> Sending packet 1 (48 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: 4d6aea0a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 673.776µs} 2025/04/30 11:04:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 client -> Sending packet 2 (70 bytes) for connection f15686a4bb087d195aa53accedb2, Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: 4d6aea0a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 client -> Sending packet 3 (70 bytes) for connection f15686a4bb087d195aa53accedb2, Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: 4d6aea0a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 client <- Reading packet 1 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.PingFrame{} 2025/04/30 11:04:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:01 client <- Reading packet 2 (257 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.784ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client Peer doesn't await address validation any longer. 2025/04/30 11:04:01 client newly acked packets (1): [1] 2025/04/30 11:04:01 client updated RTT: 42.78ms (σ: 31.134ms) 2025/04/30 11:04:01 client ECN capability confirmed. 2025/04/30 11:04:01 client lost packet 0 (time threshold) 2025/04/30 11:04:01 client Canceling loss detection timer. 2025/04/30 11:04:01 client Dropping Handshake keys. 2025/04/30 11:04:01 client <- &wire.NewTokenFrame{Token: 0x529a3ffc56510f0c532ba9806c74132f2405abec46631ca13236266e9f26fd71f73baf92eef6a0a1d284e56b50e1fa85daed3e6c1e2feec46f443706fc550a6ff03d58619559c697f5f14965a0f9d80e7c9a7818c7ab} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:01 client Ignoring all packets below 1. 2025/04/30 11:04:01 client -> Sending packet 2 (33 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: 4d6aea0a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 140.321µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:01 client -> Sending packet 3 (26 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: 4d6aea0a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:01 client Connection f15686a4bb087d195aa53accedb2 closed. 2025/04/30 11:04:01 Requesting https://server4:443/axsykxkyju. 2025/04/30 11:04:01 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:01 Increased send buffer size to 14336 kiB 2025/04/30 11:04:01 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:01 Created qlog file: /logs/qlog/4c33c5c57cc41724e60e41ab553f.sqlog 2025/04/30 11:04:01 client Starting new connection to server4 ([::]:36612 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4c33c5c57cc41724e60e41ab553f, version v1 2025/04/30 11:04:01 Adding connection ID (empty). 2025/04/30 11:04:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:01 client -> Sending packet 0 (1280 bytes) for connection 4c33c5c57cc41724e60e41ab553f, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 4c33c5c57cc41724e60e41ab553f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:01 client Parsed a coalesced packet. Part 1: 442 bytes. Remaining: 838 bytes. 2025/04/30 11:04:01 client <- Reading packet 0 (442 bytes) for connection (empty), Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: de4b35f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:04:01 client Received first packet. Switching destination connection ID to: de4b35f6 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client newly acked packets (1): [0] 2025/04/30 11:04:01 client updated RTT: 33.341691ms (σ: 16.670845ms) 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 91 bytes. 2025/04/30 11:04:01 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: de4b35f6, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:04:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4c33c5c57cc41724e60e41ab553f, InitialSourceConnectionID: de4b35f6, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc72f02d5f9183bce0dce7872c2ba6225} 2025/04/30 11:04:01 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0b0a3500, StatelessResetToken: 0x13b5af24e9b7fea15984abb1de411a0d} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a091019c, StatelessResetToken: 0xef7184a1a7956ea049a0714a8f346b22} 2025/04/30 11:04:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bb1930ab, StatelessResetToken: 0xb9e9f845160d1c9c3549ce722d4e8168} 2025/04/30 11:04:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4c33c5c57cc41724e60e41ab553f 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: bb1930ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: bb1930ab, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 client Dropping Initial keys. 2025/04/30 11:04:01 client -> Sending packet 1 (36 bytes) for connection 4c33c5c57cc41724e60e41ab553f, Handshake 2025/04/30 11:04:01 client Long Header{Type: Handshake, DestConnectionID: bb1930ab, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 client -> Sending packet 1 (48 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 688.424µs} 2025/04/30 11:04:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 11:04:01 client Peer doesn't await address validation any longer. 2025/04/30 11:04:01 client newly acked packets (1): [0] 2025/04/30 11:04:01 client updated RTT: 33.207ms (σ: 12.77ms) 2025/04/30 11:04:01 client Dropping Handshake keys. 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:01 client <- &wire.NewTokenFrame{Token: 0xa18ef1d21378f8b24fd14e6ccdb919c336a1eeae88580b0884d6062a4797fe41a280317e15e6d7f2f4eadf825238c99124b8eea88e2a93e13fcb62d6ce855bd5276dee40e046ca1f43426da7d6feb2b30ca47d9053d4} 2025/04/30 11:04:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:01 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:01 client -> Sending packet 2 (32 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.262925ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 client -> Sending packet 4 (42 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 client -> Sending packet 5 (42 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:01 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:01 client -> Sending packet 6 (33 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 57.868µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:01 client -> Sending packet 7 (26 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 client Short Header{DestConnectionID: bb1930ab, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:01 client Connection 4c33c5c57cc41724e60e41ab553f closed. 2025/04/30 11:04:01 Requesting https://server4:443/wawwcrdzgp. 2025/04/30 11:04:01 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:01 Increased send buffer size to 14336 kiB 2025/04/30 11:04:01 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:01 Created qlog file: /logs/qlog/79a8d786d757b0ec0e8713.sqlog 2025/04/30 11:04:01 client Starting new connection to server4 ([::]:54200 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 79a8d786d757b0ec0e8713, version v1 2025/04/30 11:04:01 Adding connection ID (empty). 2025/04/30 11:04:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:01 client -> Sending packet 0 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 79a8d786d757b0ec0e8713, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 client -> Sending packet 1 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 79a8d786d757b0ec0e8713, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:01 client -> Sending packet 2 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: 79a8d786d757b0ec0e8713, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:01 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 client Received first packet. Switching destination connection ID to: cef8fbe2 2025/04/30 11:04:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 client -> Sending packet 3 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 client Long Header{Type: Initial, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:02 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 79a8d786d757b0ec0e8713, InitialSourceConnectionID: cef8fbe2, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xca5a3798f267e7a2ec76d1f123876730} 2025/04/30 11:04:02 client -> Sending packet 0 (75 bytes) for connection 79a8d786d757b0ec0e8713, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client Dropping Initial keys. 2025/04/30 11:04:02 client -> Sending packet 0 (42 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: cef8fbe2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client <- Reading packet 2 (748 bytes) for connection (empty), Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:02 client -> Sending packet 1 (36 bytes) for connection 79a8d786d757b0ec0e8713, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 client -> Sending packet 2 (70 bytes) for connection 79a8d786d757b0ec0e8713, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client -> Sending packet 3 (70 bytes) for connection 79a8d786d757b0ec0e8713, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client <- Reading packet 5 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 client Dropping Handshake keys. 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:02 client <- &wire.NewTokenFrame{Token: 0x3399b02e7f0004fd921964a8147012107c0e9f1d2150889a94d5aa99e7d461e6ecf7f4e280f3bb2e2e5f7ada7c062117b578b80636f7ddca7be50c9ce883d11d1ecbca68e43427701d1272ce7c9f26c62251223d914d} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 client -> Sending packet 2 (52 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 162.002µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client -> Sending packet 3 (44 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client -> Sending packet 4 (1366 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.PingFrame{} 2025/04/30 11:04:02 client <- Reading packet 6 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:02 client <- &wire.NewTokenFrame{Token: 0x3399b02e7f0004fd921964a8147012107c0e9f1d2150889a94d5aa99e7d461e6ecf7f4e280f3bb2e2e5f7ada7c062117b578b80636f7ddca7be50c9ce883d11d1ecbca68e43427701d1272ce7c9f26c62251223d914d} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 client -> Sending packet 5 (31 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 207.808µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client <- Reading packet 7 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.PingFrame{} 2025/04/30 11:04:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:02 client -> Sending packet 6 (32 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 25.197265ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client newly acked packets (1): [4] 2025/04/30 11:04:02 client updated RTT: 32.077888ms (σ: 16.038944ms) 2025/04/30 11:04:02 client ECN capability confirmed. 2025/04/30 11:04:02 client setting loss timer for packet 3 (1-RTT) to 36.087624ms (in 2025-04-30 11:04:02.33647142 +0000 UTC m=+6.855384827) 2025/04/30 11:04:02 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:04:02.33647142 +0000 UTC m=+6.855384827 2025/04/30 11:04:02 client lost packet 3 (time threshold) 2025/04/30 11:04:02 client Canceling loss detection timer. 2025/04/30 11:04:02 client -> Sending packet 7 (44 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client <- Reading packet 9 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 224µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client newly acked packets (1): [7] 2025/04/30 11:04:02 client updated RTT: 32.032ms (σ: 12.118ms) 2025/04/30 11:04:02 client Canceling loss detection timer. 2025/04/30 11:04:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:02 client -> Sending packet 8 (26 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: df0588b1, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:02 client Connection 79a8d786d757b0ec0e8713 closed. 2025/04/30 11:04:02 Requesting https://server4:443/pkmgqtvigd. 2025/04/30 11:04:02 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:02 Increased send buffer size to 14336 kiB 2025/04/30 11:04:02 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:02 Created qlog file: /logs/qlog/014b2a4759b80e54b7b70c9b584fff09babcde.sqlog 2025/04/30 11:04:02 client Starting new connection to server4 ([::]:32962 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 014b2a4759b80e54b7b70c9b584fff09babcde, version v1 2025/04/30 11:04:02 Adding connection ID (empty). 2025/04/30 11:04:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:02 client -> Sending packet 0 (1280 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 014b2a4759b80e54b7b70c9b584fff09babcde, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:02 client Parsed a coalesced packet. Part 1: 431 bytes. Remaining: 849 bytes. 2025/04/30 11:04:02 client <- Reading packet 0 (431 bytes) for connection (empty), Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53d69d0a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 11:04:02 client Received first packet. Switching destination connection ID to: 53d69d0a 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client newly acked packets (1): [0] 2025/04/30 11:04:02 client updated RTT: 33.340986ms (σ: 16.670493ms) 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 91 bytes. 2025/04/30 11:04:02 client <- Reading packet 0 (758 bytes) for connection (empty), Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53d69d0a, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 11:04:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 014b2a4759b80e54b7b70c9b584fff09babcde, InitialSourceConnectionID: 53d69d0a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x3c30bafce53a984c2d6311633da2a979} 2025/04/30 11:04:02 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd4f447, StatelessResetToken: 0x28581769adbe7f7f6baa7e649b716e73} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6a47be9, StatelessResetToken: 0x843349f77e43d2dd64814bd837b770cd} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76fa84e8, StatelessResetToken: 0xdd2ae4257a07c71d2885f91af7c4491d} 2025/04/30 11:04:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client Dropping Initial keys. 2025/04/30 11:04:02 client -> Sending packet 1 (36 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client -> Sending packet 1 (29 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 758.365µs} 2025/04/30 11:04:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 client -> Sending packet 2 (70 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client -> Sending packet 3 (70 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76fa84e8, StatelessResetToken: 0xdd2ae4257a07c71d2885f91af7c4491d} 2025/04/30 11:04:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 client Dropping Handshake keys. 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd4f447, StatelessResetToken: 0x28581769adbe7f7f6baa7e649b716e73} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6a47be9, StatelessResetToken: 0x843349f77e43d2dd64814bd837b770cd} 2025/04/30 11:04:02 client <- &wire.NewTokenFrame{Token: 0x44362cb903cdaefd2ef9bff5f6f660cfe5a29e447d6aaf6904af3f809100921aadb8e26348a3bd7260866c9d89ee202d2c79ecc8b6ddd67de045651c25339795094ea55be07d49006000a630ace2201706101ae9dfe6} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 client -> Sending packet 3 (54 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 131.505µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client -> Sending packet 4 (44 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 client <- &wire.NewTokenFrame{Token: 0x44362cb903cdaefd2ef9bff5f6f660cfe5a29e447d6aaf6904af3f809100921aadb8e26348a3bd7260866c9d89ee202d2c79ecc8b6ddd67de045651c25339795094ea55be07d49006000a630ace2201706101ae9dfe6} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76fa84e8, StatelessResetToken: 0xdd2ae4257a07c71d2885f91af7c4491d} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6a47be9, StatelessResetToken: 0x843349f77e43d2dd64814bd837b770cd} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd4f447, StatelessResetToken: 0x28581769adbe7f7f6baa7e649b716e73} 2025/04/30 11:04:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:02 client -> Sending packet 5 (34 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.309105ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client <- Reading packet 4 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 104µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:02 client -> Sending packet 6 (33 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 62.256µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:02 client -> Sending packet 7 (26 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 76fa84e8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:02 client Connection 014b2a4759b80e54b7b70c9b584fff09babcde closed. 2025/04/30 11:04:02 Requesting https://server4:443/eqmnarwiyl. 2025/04/30 11:04:02 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:02 Increased send buffer size to 14336 kiB 2025/04/30 11:04:02 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:02 Created qlog file: /logs/qlog/37ddf460e962de632a94aafac7ecc57b.sqlog 2025/04/30 11:04:02 client Starting new connection to server4 ([::]:59784 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 37ddf460e962de632a94aafac7ecc57b, version v1 2025/04/30 11:04:02 Adding connection ID (empty). 2025/04/30 11:04:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:02 client -> Sending packet 0 (1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 37ddf460e962de632a94aafac7ecc57b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 client -> Sending packet 1 (1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 37ddf460e962de632a94aafac7ecc57b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:02 client -> Sending packet 2 (1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 37ddf460e962de632a94aafac7ecc57b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:02 client Parsed a coalesced packet. Part 1: 437 bytes. Remaining: 843 bytes. 2025/04/30 11:04:02 client <- Reading packet 0 (437 bytes) for connection (empty), Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51b5fd94, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 423, Version: v1} 2025/04/30 11:04:02 client Received first packet. Switching destination connection ID to: 51b5fd94 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Parsed a coalesced packet. Part 2: 752 bytes. Remaining: 91 bytes. 2025/04/30 11:04:02 client <- Reading packet 0 (752 bytes) for connection (empty), Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 51b5fd94, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:04:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 37ddf460e962de632a94aafac7ecc57b, InitialSourceConnectionID: 51b5fd94, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x23e1eabc079e830f85fd8334a17e6146} 2025/04/30 11:04:02 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02397379, StatelessResetToken: 0x925d4599de077519a1e2eda72273e04b} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 509070ad, StatelessResetToken: 0x4ccb5ca613fbe222f0a1adeea02da6cd} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c35e5546, StatelessResetToken: 0x7d4434f2eb6520630bbd53c8195d9cef} 2025/04/30 11:04:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 02397379, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 02397379, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client Short Header{DestConnectionID: 02397379, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client Dropping Initial keys. 2025/04/30 11:04:02 client -> Sending packet 1 (78 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 02397379, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client Short Header{DestConnectionID: 02397379, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client -> Sending packet 2 (29 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 02397379, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 833.985µs} 2025/04/30 11:04:02 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 11:04:02 client Peer doesn't await address validation any longer. 2025/04/30 11:04:02 client newly acked packets (1): [0] 2025/04/30 11:04:02 client updated RTT: 32.509505ms (σ: 16.254752ms) 2025/04/30 11:04:02 client Dropping Handshake keys. 2025/04/30 11:04:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 client <- &wire.NewTokenFrame{Token: 0x492ce34faf9409b334954f4ccdf17948f5e3ecec2b8a4418ab4552bccb4305d8726d40c91f434fa83e4f362570b373b54a9776a407665d9ba1c2d44085e0104af9f0bbb6bbaf07f61aefd5ace1faed553f6b3ffd768a} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 client <- Reading packet 2 (1051 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 528µs} 2025/04/30 11:04:02 client newly acked packets (1): [1] 2025/04/30 11:04:02 client updated RTT: 32.537ms (σ: 12.246ms) 2025/04/30 11:04:02 client Canceling loss detection timer. 2025/04/30 11:04:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:02 client -> Sending packet 3 (31 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 02397379, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 79.418µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:02 client -> Sending packet 4 (26 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 02397379, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:02 client Connection 37ddf460e962de632a94aafac7ecc57b closed. 2025/04/30 11:04:02 Requesting https://server4:443/phdrvjidgi. 2025/04/30 11:04:02 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:02 Increased send buffer size to 14336 kiB 2025/04/30 11:04:02 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:02 Created qlog file: /logs/qlog/42d674afb3156a1517e1af.sqlog 2025/04/30 11:04:02 client Starting new connection to server4 ([::]:60072 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 42d674afb3156a1517e1af, version v1 2025/04/30 11:04:02 Adding connection ID (empty). 2025/04/30 11:04:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:02 client -> Sending packet 0 (1280 bytes) for connection 42d674afb3156a1517e1af, Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 42d674afb3156a1517e1af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:02 client Parsed a coalesced packet. Part 1: 450 bytes. Remaining: 830 bytes. 2025/04/30 11:04:02 client <- Reading packet 0 (450 bytes) for connection (empty), Initial 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 54f32acd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:02 client Received first packet. Switching destination connection ID to: 54f32acd 2025/04/30 11:04:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client newly acked packets (1): [0] 2025/04/30 11:04:02 client updated RTT: 33.527045ms (σ: 16.763522ms) 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 91 bytes. 2025/04/30 11:04:02 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 54f32acd, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 42d674afb3156a1517e1af, InitialSourceConnectionID: 54f32acd, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x25ca94e9dc980b2e901e669c11379832} 2025/04/30 11:04:02 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 42d674afb3156a1517e1af 2025/04/30 11:04:02 client Long Header{Type: Initial, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client Short Header{DestConnectionID: 811f5fc4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 client Dropping Initial keys. 2025/04/30 11:04:02 client -> Sending packet 1 (78 bytes) for connection 42d674afb3156a1517e1af, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 client Short Header{DestConnectionID: 811f5fc4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 client -> Sending packet 2 (29 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 client Short Header{DestConnectionID: 811f5fc4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 756.41µs} 2025/04/30 11:04:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 client -> Sending packet 2 (70 bytes) for connection 42d674afb3156a1517e1af, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 client -> Sending packet 3 (70 bytes) for connection 42d674afb3156a1517e1af, Handshake 2025/04/30 11:04:02 client Long Header{Type: Handshake, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:03 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 client <- &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 client Dropping Handshake keys. 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:03 client -> Sending packet 4 (35 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: 811f5fc4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 142.946µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:03 client Skipping packet number 3 2025/04/30 11:04:03 client -> Sending packet 5 (42 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: 811f5fc4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.224ms} 2025/04/30 11:04:03 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:03 client -> Sending packet 6 (26 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: 811f5fc4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:03 client Connection 42d674afb3156a1517e1af closed. 2025/04/30 11:04:03 Requesting https://server4:443/jdarlldhgi. 2025/04/30 11:04:03 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:03 Increased send buffer size to 14336 kiB 2025/04/30 11:04:03 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:03 Created qlog file: /logs/qlog/02e5c78bc423fa151d2c1c29e1c084.sqlog 2025/04/30 11:04:03 client Starting new connection to server4 ([::]:52098 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 02e5c78bc423fa151d2c1c29e1c084, version v1 2025/04/30 11:04:03 Adding connection ID (empty). 2025/04/30 11:04:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:03 client -> Sending packet 0 (1280 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: 02e5c78bc423fa151d2c1c29e1c084, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:03 client Parsed a coalesced packet. Part 1: 435 bytes. Remaining: 845 bytes. 2025/04/30 11:04:03 client <- Reading packet 0 (435 bytes) for connection (empty), Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6b0475a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 421, Version: v1} 2025/04/30 11:04:03 client Received first packet. Switching destination connection ID to: a6b0475a 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 client newly acked packets (1): [0] 2025/04/30 11:04:03 client updated RTT: 33.402803ms (σ: 16.701401ms) 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Parsed a coalesced packet. Part 2: 754 bytes. Remaining: 91 bytes. 2025/04/30 11:04:03 client <- Reading packet 0 (754 bytes) for connection (empty), Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6b0475a, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 02e5c78bc423fa151d2c1c29e1c084, InitialSourceConnectionID: a6b0475a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x43221020c2cca69076781dab84c2e5e3} 2025/04/30 11:04:03 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01955f8e, StatelessResetToken: 0xf6e98f36c008fef6dc26d52733bf37d3} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c449df3, StatelessResetToken: 0x8347d72905dc5204c5a2324dd7fe9fc4} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 12e3f608, StatelessResetToken: 0x729b2ef011e4d9cb782219a1a40a0c34} 2025/04/30 11:04:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: 01955f8e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: 01955f8e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:03 client Short Header{DestConnectionID: 01955f8e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 client Dropping Initial keys. 2025/04/30 11:04:03 client -> Sending packet 1 (36 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: 01955f8e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 client -> Sending packet 1 (29 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: 01955f8e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 900.185µs} 2025/04/30 11:04:03 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 11:04:03 client Peer doesn't await address validation any longer. 2025/04/30 11:04:03 client newly acked packets (1): [0] 2025/04/30 11:04:03 client updated RTT: 33.278ms (σ: 12.772ms) 2025/04/30 11:04:03 client Canceling loss detection timer. 2025/04/30 11:04:03 client Dropping Handshake keys. 2025/04/30 11:04:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 client <- &wire.NewTokenFrame{Token: 0x612832872b7598c05ccd35534722f61eebf605c15d59bcdb6f7474bbf21f73cc954927ddf454247ecb369b701b8473b7a78e526b052e9629877e798314541b116de21b1560f79994008202c94948c2ca672a622c30e6} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:03 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:03 client -> Sending packet 2 (31 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: 01955f8e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 58.459µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:03 client -> Sending packet 3 (26 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: 01955f8e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:03 client Connection 02e5c78bc423fa151d2c1c29e1c084 closed. 2025/04/30 11:04:03 Requesting https://server4:443/nnbtfkdaoz. 2025/04/30 11:04:03 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:03 Increased send buffer size to 14336 kiB 2025/04/30 11:04:03 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:03 Created qlog file: /logs/qlog/b13c21df9046da12848ef769d2d70ccddf.sqlog 2025/04/30 11:04:03 client Starting new connection to server4 ([::]:40338 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b13c21df9046da12848ef769d2d70ccddf, version v1 2025/04/30 11:04:03 Adding connection ID (empty). 2025/04/30 11:04:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:03 client -> Sending packet 0 (1280 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: b13c21df9046da12848ef769d2d70ccddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:04:03 client Parsed a coalesced packet. Part 1: 447 bytes. Remaining: 833 bytes. 2025/04/30 11:04:03 client <- Reading packet 0 (447 bytes) for connection (empty), Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f28cd4ec, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:04:03 client Received first packet. Switching destination connection ID to: f28cd4ec 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 client newly acked packets (1): [0] 2025/04/30 11:04:03 client updated RTT: 33.483731ms (σ: 16.741865ms) 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Parsed a coalesced packet. Part 2: 742 bytes. Remaining: 91 bytes. 2025/04/30 11:04:03 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f28cd4ec, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:04:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b13c21df9046da12848ef769d2d70ccddf, InitialSourceConnectionID: f28cd4ec, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x385abef61ed6c809392fefbbd325a9ca} 2025/04/30 11:04:03 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 814c8c28, StatelessResetToken: 0x7e897e70457334a6f5520015b2ff34b2} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9d8462e, StatelessResetToken: 0xe2d022e6b0a3f46ab574c9206fe47c46} 2025/04/30 11:04:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70320f6b, StatelessResetToken: 0x40cd2f6d1633df560476d2683aae4712} 2025/04/30 11:04:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b13c21df9046da12848ef769d2d70ccddf 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: c9d8462e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: c9d8462e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:03 client Short Header{DestConnectionID: c9d8462e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:03 client Dropping Initial keys. 2025/04/30 11:04:03 client -> Sending packet 1 (78 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: c9d8462e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 client Short Header{DestConnectionID: c9d8462e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 client -> Sending packet 2 (29 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: c9d8462e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 875.403µs} 2025/04/30 11:04:03 client <- Reading packet 1 (261 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 384µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 client Peer doesn't await address validation any longer. 2025/04/30 11:04:03 client newly acked packets (1): [0] 2025/04/30 11:04:03 client setting loss timer for packet 1 (1-RTT) to 37.669197ms (in 2025-04-30 11:04:03.146108405 +0000 UTC m=+7.665021812) 2025/04/30 11:04:03 client Dropping Handshake keys. 2025/04/30 11:04:03 client <- &wire.NewTokenFrame{Token: 0xbbcc92747f70b9c0667a28807448475cfc2f39a47dd38a3aff187de064cba7c470c764f1a520a53ffde080a1d6fc7882fb6674ff825b956eb4d6c8d3e98c075dcc9e5172f831769f5d8accda072b1eb60dc4383934b5} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:03 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:04:03.146108405 +0000 UTC m=+7.665021812 2025/04/30 11:04:03 client lost packet 1 (time threshold) 2025/04/30 11:04:03 client Canceling loss detection timer. 2025/04/30 11:04:03 client -> Sending packet 3 (51 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: c9d8462e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 6.303964ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 client <- Reading packet 2 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 248µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:03 client newly acked packets (1): [3] 2025/04/30 11:04:03 client updated RTT: 33.26ms (σ: 13.001ms) 2025/04/30 11:04:03 client ECN capability confirmed. 2025/04/30 11:04:03 client Canceling loss detection timer. 2025/04/30 11:04:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:03 client Ignoring all packets below 2. 2025/04/30 11:04:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:03 client -> Sending packet 4 (26 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: c9d8462e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:03 client Connection b13c21df9046da12848ef769d2d70ccddf closed. 2025/04/30 11:04:03 Requesting https://server4:443/smlriangdh. 2025/04/30 11:04:03 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:03 Increased send buffer size to 14336 kiB 2025/04/30 11:04:03 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:03 Created qlog file: /logs/qlog/5c15ff8e6eb603503a.sqlog 2025/04/30 11:04:03 client Starting new connection to server4 ([::]:41165 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5c15ff8e6eb603503a, version v1 2025/04/30 11:04:03 Adding connection ID (empty). 2025/04/30 11:04:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:03 client -> Sending packet 0 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: 5c15ff8e6eb603503a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:03 client -> Sending packet 1 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: 5c15ff8e6eb603503a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 client -> Sending packet 2 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: 5c15ff8e6eb603503a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:03 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 client Received first packet. Switching destination connection ID to: b8e83c99 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client -> Sending packet 3 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 client -> Sending packet 4 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:04:03 client -> Sending packet 5 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 client -> Sending packet 6 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 client <- Reading packet 3 (41 bytes) for connection (empty), Initial 2025/04/30 11:04:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 27, Version: v1} 2025/04/30 11:04:03 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:04:03 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8e83c99, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5c15ff8e6eb603503a, InitialSourceConnectionID: b8e83c99, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8cf80a378e9c9aa6d708c3666e559d63} 2025/04/30 11:04:03 client -> Sending packet 0 (75 bytes) for connection 5c15ff8e6eb603503a, Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: b8e83c99, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:03 client Dropping Initial keys. 2025/04/30 11:04:03 client -> Sending packet 0 (42 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 client Short Header{DestConnectionID: b8e83c99, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 client <- Reading packet 2 (748 bytes) for connection (empty), Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8e83c99, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:03 client -> Sending packet 1 (36 bytes) for connection 5c15ff8e6eb603503a, Handshake 2025/04/30 11:04:03 client Long Header{Type: Handshake, DestConnectionID: b8e83c99, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/04/30 11:04:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 client -> Sending packet 2 (70 bytes) for connection 5c15ff8e6eb603503a, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: b8e83c99, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client -> Sending packet 3 (70 bytes) for connection 5c15ff8e6eb603503a, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: b8e83c99, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:04 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f285fee, StatelessResetToken: 0x11056c3a071e1fea54a7f4eab65549db} 2025/04/30 11:04:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 client Dropping Handshake keys. 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d7412f5, StatelessResetToken: 0xf88c52c5ea04156df4565c6888ed18d0} 2025/04/30 11:04:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f50378f, StatelessResetToken: 0x09313ad615b4cc3fda21d0138a8d4c21} 2025/04/30 11:04:04 client <- &wire.NewTokenFrame{Token: 0xb0d353efd728bdf306d4ebf345fba7771ee8896ec18aee329d92abfadfe35f7abfb0e6b9325498c39b7b14b277759c27db9b0262847770f0dba40320f6e7130d0d4c4a434d28218cb5a77525200a3912db21db881ae6} 2025/04/30 11:04:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 client -> Sending packet 2 (52 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 3d7412f5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 177.431µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 client -> Sending packet 3 (44 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 3d7412f5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 client -> Sending packet 4 (1366 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 3d7412f5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.PingFrame{} 2025/04/30 11:04:04 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client newly acked packets (1): [3] 2025/04/30 11:04:04 client updated RTT: 30.936943ms (σ: 15.468471ms) 2025/04/30 11:04:04 client ECN capability confirmed. 2025/04/30 11:04:04 client Canceling loss detection timer. 2025/04/30 11:04:04 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:04 client -> Sending packet 5 (26 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 3d7412f5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:04 client Connection 5c15ff8e6eb603503a closed. 2025/04/30 11:04:04 Requesting https://server4:443/fowffbpfbz. 2025/04/30 11:04:04 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:04 Increased send buffer size to 14336 kiB 2025/04/30 11:04:04 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:04 Created qlog file: /logs/qlog/416fb4e109fc0dad981233c17b.sqlog 2025/04/30 11:04:04 client Starting new connection to server4 ([::]:58102 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 416fb4e109fc0dad981233c17b, version v1 2025/04/30 11:04:04 Adding connection ID (empty). 2025/04/30 11:04:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:04 client -> Sending packet 0 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: 416fb4e109fc0dad981233c17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 client -> Sending packet 1 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: 416fb4e109fc0dad981233c17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:04 client -> Sending packet 2 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: 416fb4e109fc0dad981233c17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:04 client Parsed a coalesced packet. Part 1: 449 bytes. Remaining: 831 bytes. 2025/04/30 11:04:04 client <- Reading packet 0 (449 bytes) for connection (empty), Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:04:04 client Received first packet. Switching destination connection ID to: d34a5e8f 2025/04/30 11:04:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 91 bytes. 2025/04/30 11:04:04 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:04:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:04:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 416fb4e109fc0dad981233c17b, InitialSourceConnectionID: d34a5e8f, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8f7519b15c43a63eb1544e988fa7051d} 2025/04/30 11:04:04 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e78f2792, StatelessResetToken: 0x54259b660e6ef763f50014e9ed71d58d} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c6df4de, StatelessResetToken: 0xda9332d6c40e30ae833e01b45406eb50} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8d937ad, StatelessResetToken: 0x75ce03a09d7a392886734a8d11e0efb7} 2025/04/30 11:04:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 416fb4e109fc0dad981233c17b 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: 4c6df4de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: 4c6df4de, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 client Dropping Initial keys. 2025/04/30 11:04:04 client Dropping %!s(logging.PacketType=0) packet (37 bytes) because we already dropped the keys. 2025/04/30 11:04:04 client -> Sending packet 1 (36 bytes) for connection 416fb4e109fc0dad981233c17b, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: 4c6df4de, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 client -> Sending packet 1 (29 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 924.865µs} 2025/04/30 11:04:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 client -> Sending packet 2 (70 bytes) for connection 416fb4e109fc0dad981233c17b, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: 4c6df4de, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client -> Sending packet 3 (70 bytes) for connection 416fb4e109fc0dad981233c17b, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: 4c6df4de, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/04/30 11:04:04 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.NewTokenFrame{Token: 0xf50de0ace8ce87c2acfa261ee7553a7769f542d42b7cdd02069b7185cb72fd479195c7f1f5dd62283e80d93d5ab909654b6bf6a6ca054e751e6fb8a5324d0cbab664f6502313284ae23734e708d0be8c53744d242709} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c6df4de, StatelessResetToken: 0xda9332d6c40e30ae833e01b45406eb50} 2025/04/30 11:04:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8d937ad, StatelessResetToken: 0x75ce03a09d7a392886734a8d11e0efb7} 2025/04/30 11:04:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 client Dropping Handshake keys. 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e78f2792, StatelessResetToken: 0x54259b660e6ef763f50014e9ed71d58d} 2025/04/30 11:04:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 client -> Sending packet 3 (54 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 125.283µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 client -> Sending packet 4 (44 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 client -> Sending packet 5 (1366 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.PingFrame{} 2025/04/30 11:04:04 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.PingFrame{} 2025/04/30 11:04:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:04 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:04 client -> Sending packet 6 (34 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.231844ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client <- Reading packet 5 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 192µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:04 client -> Sending packet 7 (35 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 97.863µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:04 client -> Sending packet 8 (26 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: 4c6df4de, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:04 client Connection 416fb4e109fc0dad981233c17b closed. 2025/04/30 11:04:04 Requesting https://server4:443/bqqtsekeua. 2025/04/30 11:04:04 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:04 Increased send buffer size to 14336 kiB 2025/04/30 11:04:04 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:04 Created qlog file: /logs/qlog/8c746c22f0fc03dc2ab12c98.sqlog 2025/04/30 11:04:04 client Starting new connection to server4 ([::]:46587 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8c746c22f0fc03dc2ab12c98, version v1 2025/04/30 11:04:04 Adding connection ID (empty). 2025/04/30 11:04:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:04 client -> Sending packet 0 (1280 bytes) for connection 8c746c22f0fc03dc2ab12c98, Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: 8c746c22f0fc03dc2ab12c98, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:04 client Parsed a coalesced packet. Part 1: 443 bytes. Remaining: 837 bytes. 2025/04/30 11:04:04 client <- Reading packet 0 (443 bytes) for connection (empty), Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d4595fd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 429, Version: v1} 2025/04/30 11:04:04 client Received first packet. Switching destination connection ID to: 4d4595fd 2025/04/30 11:04:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 client newly acked packets (1): [0] 2025/04/30 11:04:04 client updated RTT: 33.425819ms (σ: 16.712909ms) 2025/04/30 11:04:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 91 bytes. 2025/04/30 11:04:04 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d4595fd, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:04:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:04:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8c746c22f0fc03dc2ab12c98, InitialSourceConnectionID: 4d4595fd, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x852c2456669a149db202d7bfe78a68ff} 2025/04/30 11:04:04 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b25d1b1, StatelessResetToken: 0xf7189365ba8dc274280df0bd9f9a99be} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d1a15c7b, StatelessResetToken: 0x23387058c65bba87ceeee2bd4ef35ecf} 2025/04/30 11:04:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: def9f1ff, StatelessResetToken: 0xb255f4ef5d7cff43c6ff7229796e7ca9} 2025/04/30 11:04:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8c746c22f0fc03dc2ab12c98 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client Short Header{DestConnectionID: d1a15c7b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 client Dropping Initial keys. 2025/04/30 11:04:04 client -> Sending packet 1 (78 bytes) for connection 8c746c22f0fc03dc2ab12c98, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 client Short Header{DestConnectionID: d1a15c7b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 client -> Sending packet 2 (29 bytes) for connection 8c746c22f0fc03dc2ab12c98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: d1a15c7b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 780.435µs} 2025/04/30 11:04:04 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 client -> Sending packet 2 (70 bytes) for connection 8c746c22f0fc03dc2ab12c98, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client -> Sending packet 3 (70 bytes) for connection 8c746c22f0fc03dc2ab12c98, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:04 client -> Sending packet 3 (33 bytes) for connection 8c746c22f0fc03dc2ab12c98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 client Short Header{DestConnectionID: d1a15c7b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 77.915µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:04 client -> Sending packet 4 (61 bytes) for connection 8c746c22f0fc03dc2ab12c98, Handshake 2025/04/30 11:04:04 client Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:04:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 client Short Header{DestConnectionID: d1a15c7b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:04 client Connection 8c746c22f0fc03dc2ab12c98 closed. 2025/04/30 11:04:04 Requesting https://server4:443/ergdkzbhtn. 2025/04/30 11:04:04 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:04 Increased send buffer size to 14336 kiB 2025/04/30 11:04:04 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:04 Created qlog file: /logs/qlog/1d8f8b2e316e48107d30e89cf8.sqlog 2025/04/30 11:04:04 client Starting new connection to server4 ([::]:33034 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1d8f8b2e316e48107d30e89cf8, version v1 2025/04/30 11:04:04 Adding connection ID (empty). 2025/04/30 11:04:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:04 client -> Sending packet 0 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:04 client Long Header{Type: Initial, DestConnectionID: 1d8f8b2e316e48107d30e89cf8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 client -> Sending packet 1 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: 1d8f8b2e316e48107d30e89cf8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:05 client -> Sending packet 2 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: 1d8f8b2e316e48107d30e89cf8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:05 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 client Received first packet. Switching destination connection ID to: b1cf4dae 2025/04/30 11:04:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client -> Sending packet 3 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: b1cf4dae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:05 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 client -> Sending packet 4 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: b1cf4dae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:05 client <- Reading packet 3 (37 bytes) for connection (empty), Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 client newly acked packets (1): [2] 2025/04/30 11:04:05 client updated RTT: 34.058198ms (σ: 17.029099ms) 2025/04/30 11:04:05 client <- Reading packet 2 (739 bytes) for connection (empty), Handshake 2025/04/30 11:04:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1d8f8b2e316e48107d30e89cf8, InitialSourceConnectionID: b1cf4dae, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa7f9457db928c351f39f874c6747cd40} 2025/04/30 11:04:05 client -> Sending packet 0 (75 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Handshake 2025/04/30 11:04:05 client Long Header{Type: Handshake, DestConnectionID: b1cf4dae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:05 client Dropping Initial keys. 2025/04/30 11:04:05 client -> Sending packet 0 (42 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: b1cf4dae, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 client Dropping Handshake keys. 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 client <- &wire.NewTokenFrame{Token: 0x15aaebb7ab8cb8794af850109377e93cff90033cb6c2a029519e0d72aae68358a99026b5ad6122d4f2a7b890eda92477e6efd85312f32fe15798e654ac2b4b90efe0b62dc44528627a97825f25f3721d73f1515999fc} 2025/04/30 11:04:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:05 client -> Sending packet 1 (33 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 118.621µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:05 client <- &wire.NewTokenFrame{Token: 0x15aaebb7ab8cb8794af850109377e93cff90033cb6c2a029519e0d72aae68358a99026b5ad6122d4f2a7b890eda92477e6efd85312f32fe15798e654ac2b4b90efe0b62dc44528627a97825f25f3721d73f1515999fc} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:05 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client newly acked packets (1): [0] 2025/04/30 11:04:05 client updated RTT: 33.759ms (σ: 13.368ms) 2025/04/30 11:04:05 client ECN capability confirmed. 2025/04/30 11:04:05 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:05 client -> Sending packet 2 (32 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.274847ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 client -> Sending packet 4 (25 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 client -> Sending packet 5 (25 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 160µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client newly acked packets (1): [5] 2025/04/30 11:04:05 client updated RTT: 33.432ms (σ: 10.679ms) 2025/04/30 11:04:05 client Canceling loss detection timer. 2025/04/30 11:04:05 client <- Reading packet 8 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:05 client <- &wire.NewTokenFrame{Token: 0x15aaebb7ab8cb8794af850109377e93cff90033cb6c2a029519e0d72aae68358a99026b5ad6122d4f2a7b890eda92477e6efd85312f32fe15798e654ac2b4b90efe0b62dc44528627a97825f25f3721d73f1515999fc} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:05 client -> Sending packet 6 (1366 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.PingFrame{} 2025/04/30 11:04:05 client -> Sending packet 7 (35 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 189.584µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:05 client -> Sending packet 8 (26 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: 4d3048a1, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:05 client Connection 1d8f8b2e316e48107d30e89cf8 closed. 2025/04/30 11:04:05 Requesting https://server4:443/ynpohrxvow. 2025/04/30 11:04:05 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:05 Increased send buffer size to 14336 kiB 2025/04/30 11:04:05 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:05 Created qlog file: /logs/qlog/7fe3ac196fef8486de73cb.sqlog 2025/04/30 11:04:05 client Starting new connection to server4 ([::]:34362 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7fe3ac196fef8486de73cb, version v1 2025/04/30 11:04:05 Adding connection ID (empty). 2025/04/30 11:04:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:05 client -> Sending packet 0 (1280 bytes) for connection 7fe3ac196fef8486de73cb, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: 7fe3ac196fef8486de73cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 11:04:05 client Parsed a coalesced packet. Part 1: 439 bytes. Remaining: 841 bytes. 2025/04/30 11:04:05 client <- Reading packet 0 (439 bytes) for connection (empty), Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b336f3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 425, Version: v1} 2025/04/30 11:04:05 client Received first packet. Switching destination connection ID to: 7b336f3a 2025/04/30 11:04:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 client newly acked packets (1): [0] 2025/04/30 11:04:05 client updated RTT: 33.362143ms (σ: 16.681071ms) 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Parsed a coalesced packet. Part 2: 750 bytes. Remaining: 91 bytes. 2025/04/30 11:04:05 client <- Reading packet 0 (750 bytes) for connection (empty), Handshake 2025/04/30 11:04:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b336f3a, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 11:04:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7fe3ac196fef8486de73cb, InitialSourceConnectionID: 7b336f3a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x10664bba163edcf0001af9a9b91d0552} 2025/04/30 11:04:05 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8541efc, StatelessResetToken: 0xb1ef48c463fc3f9fe87a6a46dd974315} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1df0c416, StatelessResetToken: 0xfc4969397c28478a8a0d50e592a9a3b8} 2025/04/30 11:04:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8ab1bc0, StatelessResetToken: 0xe5503eef5c959abc56e8dd2f0776e51e} 2025/04/30 11:04:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7fe3ac196fef8486de73cb 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: c8541efc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 client Long Header{Type: Handshake, DestConnectionID: c8541efc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 client Dropping Initial keys. 2025/04/30 11:04:05 client -> Sending packet 1 (78 bytes) for connection 7fe3ac196fef8486de73cb, Handshake 2025/04/30 11:04:05 client Long Header{Type: Handshake, DestConnectionID: c8541efc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 client -> Sending packet 2 (29 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 832.943µs} 2025/04/30 11:04:05 client <- Reading packet 1 (261 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 328µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client Peer doesn't await address validation any longer. 2025/04/30 11:04:05 client newly acked packets (1): [0] 2025/04/30 11:04:05 client setting loss timer for packet 1 (1-RTT) to 37.53241ms (in 2025-04-30 11:04:05.46960375 +0000 UTC m=+9.988517147) 2025/04/30 11:04:05 client Dropping Handshake keys. 2025/04/30 11:04:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 client <- &wire.NewTokenFrame{Token: 0x8a2ba5708e53a7b24bb073e3c84ac6f193da6df2e6cbc094dba6cda049413ee543ceba88811689a760f6ad7ec7e68b22da2f7bb369f181cc3192985781380d2410a15583baebc9030bfb70d1777a62fc438c41e9515f} 2025/04/30 11:04:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:05 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:04:05.46960375 +0000 UTC m=+9.988517147 2025/04/30 11:04:05 client lost packet 1 (time threshold) 2025/04/30 11:04:05 client Canceling loss detection timer. 2025/04/30 11:04:05 client -> Sending packet 3 (51 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 6.316739ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 client -> Sending packet 5 (42 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 client -> Sending packet 6 (42 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:05 client -> Sending packet 7 (33 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 69.63µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:05 client -> Sending packet 8 (26 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 client Short Header{DestConnectionID: c8541efc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:05 client Connection 7fe3ac196fef8486de73cb closed. 2025/04/30 11:04:05 Requesting https://server4:443/scqxybdgwa. 2025/04/30 11:04:05 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:05 Increased send buffer size to 14336 kiB 2025/04/30 11:04:05 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:05 Created qlog file: /logs/qlog/dd9f272266176abdf2c64c85.sqlog 2025/04/30 11:04:05 client Starting new connection to server4 ([::]:51883 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dd9f272266176abdf2c64c85, version v1 2025/04/30 11:04:05 Adding connection ID (empty). 2025/04/30 11:04:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:05 client -> Sending packet 0 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 client -> Sending packet 1 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:05 client -> Sending packet 2 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 client Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:06 client Queueing packet (744 bytes) for later decryption 2025/04/30 11:04:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:04:06 client -> Sending packet 3 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:06 client Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:06 client -> Sending packet 4 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:06 client Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:06 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 612a2dea, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:06 client Received first packet. Switching destination connection ID to: 612a2dea 2025/04/30 11:04:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:06 client -> Sending packet 5 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:06 client Long Header{Type: Initial, DestConnectionID: 612a2dea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:04:06 client <- Reading packet 1 (744 bytes) for connection (empty), Handshake 2025/04/30 11:04:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 612a2dea, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dd9f272266176abdf2c64c85, InitialSourceConnectionID: 612a2dea, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x856dbf7e6e807979d9a832195a577cce} 2025/04/30 11:04:06 client -> Sending packet 0 (75 bytes) for connection dd9f272266176abdf2c64c85, Handshake 2025/04/30 11:04:06 client Long Header{Type: Handshake, DestConnectionID: 612a2dea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:06 client Dropping Initial keys. 2025/04/30 11:04:06 client -> Sending packet 0 (42 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: 612a2dea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:06 client -> Sending packet 1 (70 bytes) for connection dd9f272266176abdf2c64c85, Handshake 2025/04/30 11:04:06 client Long Header{Type: Handshake, DestConnectionID: 612a2dea, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:06 client -> Sending packet 2 (70 bytes) for connection dd9f272266176abdf2c64c85, Handshake 2025/04/30 11:04:06 client Long Header{Type: Handshake, DestConnectionID: 612a2dea, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:06 client <- Reading packet 2 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cae53611, StatelessResetToken: 0x70881b1b0343975d2ace3b7a2752a279} 2025/04/30 11:04:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 client Dropping Handshake keys. 2025/04/30 11:04:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6025be0, StatelessResetToken: 0xf6a0532469045e40c6d19bf7dea4e7d5} 2025/04/30 11:04:06 client <- &wire.NewTokenFrame{Token: 0xca41edc06115b248568e1bffd5f50d1bd2f28b58a287828e4e77376b06840d4445798a877c93e086f19ee43e9cfe7260be5f21787a520ffda000f54b5a14bd7b3eb64a8c6ce110df559966286e6f0f86b042525a2208} 2025/04/30 11:04:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9155ed9, StatelessResetToken: 0x5fdfb1a0de86a9ab1366e79caf83e671} 2025/04/30 11:04:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:06 client -> Sending packet 2 (52 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 159.117µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:06 client -> Sending packet 3 (44 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:06 client -> Sending packet 4 (1366 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.PingFrame{} 2025/04/30 11:04:06 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cae53611, StatelessResetToken: 0x70881b1b0343975d2ace3b7a2752a279} 2025/04/30 11:04:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6025be0, StatelessResetToken: 0xf6a0532469045e40c6d19bf7dea4e7d5} 2025/04/30 11:04:06 client <- &wire.NewTokenFrame{Token: 0xca41edc06115b248568e1bffd5f50d1bd2f28b58a287828e4e77376b06840d4445798a877c93e086f19ee43e9cfe7260be5f21787a520ffda000f54b5a14bd7b3eb64a8c6ce110df559966286e6f0f86b042525a2208} 2025/04/30 11:04:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9155ed9, StatelessResetToken: 0x5fdfb1a0de86a9ab1366e79caf83e671} 2025/04/30 11:04:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:06 client -> Sending packet 5 (31 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 147.057µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:06 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client <- &wire.PingFrame{} 2025/04/30 11:04:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:06 client <- Reading packet 5 (30 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.288ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:06 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:06 client -> Sending packet 6 (32 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 25.211629ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:06 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:06 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:06 client -> Sending packet 7 (33 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 2}}, DelayTime: 105.106µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:06 client -> Sending packet 8 (26 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 client Short Header{DestConnectionID: f9155ed9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:06 client Connection dd9f272266176abdf2c64c85 closed. 2025/04/30 11:04:06 Requesting https://server4:443/zymnxputuk. 2025/04/30 11:04:06 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:06 Increased send buffer size to 14336 kiB 2025/04/30 11:04:06 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:06 Created qlog file: /logs/qlog/a21221f5eea20ee19f9c.sqlog 2025/04/30 11:04:06 client Starting new connection to server4 ([::]:54811 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a21221f5eea20ee19f9c, version v1 2025/04/30 11:04:06 Adding connection ID (empty). 2025/04/30 11:04:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:06 client -> Sending packet 0 (1280 bytes) for connection a21221f5eea20ee19f9c, Initial 2025/04/30 11:04:06 client Long Header{Type: Initial, DestConnectionID: a21221f5eea20ee19f9c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:04:07 client Parsed a coalesced packet. Part 1: 450 bytes. Remaining: 830 bytes. 2025/04/30 11:04:07 client <- Reading packet 0 (450 bytes) for connection (empty), Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2b4c673d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:07 client Received first packet. Switching destination connection ID to: 2b4c673d 2025/04/30 11:04:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 client newly acked packets (1): [0] 2025/04/30 11:04:07 client updated RTT: 33.397583ms (σ: 16.698791ms) 2025/04/30 11:04:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 91 bytes. 2025/04/30 11:04:07 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2b4c673d, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a21221f5eea20ee19f9c, InitialSourceConnectionID: 2b4c673d, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8dab60f1b21af041040354add6a58457} 2025/04/30 11:04:07 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4fdb4868, StatelessResetToken: 0x7e27afdf08fe6ad8659eb8e7fcc940b7} 2025/04/30 11:04:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12cce69d, StatelessResetToken: 0x722584e1216b851cd8436503979561b1} 2025/04/30 11:04:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 95ae4624, StatelessResetToken: 0x4baafba5766dbb46c83135b404b730a7} 2025/04/30 11:04:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a21221f5eea20ee19f9c 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 95ae4624, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 95ae4624, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 client Short Header{DestConnectionID: 95ae4624, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:07 client Dropping Initial keys. 2025/04/30 11:04:07 client -> Sending packet 1 (78 bytes) for connection a21221f5eea20ee19f9c, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 95ae4624, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 client Short Header{DestConnectionID: 95ae4624, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:07 client -> Sending packet 2 (29 bytes) for connection a21221f5eea20ee19f9c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 95ae4624, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 661.313µs} 2025/04/30 11:04:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 client -> Sending packet 2 (70 bytes) for connection a21221f5eea20ee19f9c, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 95ae4624, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 client -> Sending packet 3 (70 bytes) for connection a21221f5eea20ee19f9c, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 95ae4624, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:07 client -> Sending packet 3 (33 bytes) for connection a21221f5eea20ee19f9c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 95ae4624, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 85.229µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:07 client -> Sending packet 4 (61 bytes) for connection a21221f5eea20ee19f9c, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 95ae4624, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:04:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:07 client Short Header{DestConnectionID: 95ae4624, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:07 client Connection a21221f5eea20ee19f9c closed. 2025/04/30 11:04:07 Requesting https://server4:443/kodqbvewyo. 2025/04/30 11:04:07 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:07 Increased send buffer size to 14336 kiB 2025/04/30 11:04:07 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:07 Created qlog file: /logs/qlog/4670bb1fdbf8f724cae6.sqlog 2025/04/30 11:04:07 client Starting new connection to server4 ([::]:45480 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4670bb1fdbf8f724cae6, version v1 2025/04/30 11:04:07 Adding connection ID (empty). 2025/04/30 11:04:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:07 client -> Sending packet 0 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 4670bb1fdbf8f724cae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 client -> Sending packet 1 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 4670bb1fdbf8f724cae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:07 client -> Sending packet 2 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 4670bb1fdbf8f724cae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:07 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 18bb1122, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 client Received first packet. Switching destination connection ID to: 18bb1122 2025/04/30 11:04:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client -> Sending packet 3 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 18bb1122, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:07 client <- Reading packet 3 (37 bytes) for connection (empty), Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 18bb1122, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 client newly acked packets (1): [2] 2025/04/30 11:04:07 client updated RTT: 34.085025ms (σ: 17.042512ms) 2025/04/30 11:04:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:07 client <- Reading packet 2 (736 bytes) for connection (empty), Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 18bb1122, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:04:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:04:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4670bb1fdbf8f724cae6, InitialSourceConnectionID: 18bb1122, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x5f94e23d147dc2fffe18afebfa844c1a} 2025/04/30 11:04:07 client -> Sending packet 0 (75 bytes) for connection 4670bb1fdbf8f724cae6, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 18bb1122, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 client Dropping Initial keys. 2025/04/30 11:04:07 client -> Sending packet 0 (42 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 18bb1122, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 client -> Sending packet 1 (70 bytes) for connection 4670bb1fdbf8f724cae6, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 18bb1122, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 client -> Sending packet 2 (70 bytes) for connection 4670bb1fdbf8f724cae6, Handshake 2025/04/30 11:04:07 client Long Header{Type: Handshake, DestConnectionID: 18bb1122, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:07 client Dropping Handshake keys. 2025/04/30 11:04:07 client <- &wire.NewTokenFrame{Token: 0xb52c4e105c8ba4e37aeae191a31be4f65f835b1ab50859b34fb6cfcac5f501cddf3fd6003e4abba4d9e07491f825a85dd6690d1e08061d4582bf3e06f1c5d309991c6bca04b31b0d1adc26199e79b69e36e23f6b3772} 2025/04/30 11:04:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bbf5b04d, StatelessResetToken: 0x34bc937c3b05bc1f736647896cf6573a} 2025/04/30 11:04:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4f8bb9a8, StatelessResetToken: 0x02db8a84244c3ed45d1b178a2dffa0eb} 2025/04/30 11:04:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 31b3655e, StatelessResetToken: 0x3bb4bf90ea29f98254438a731a5364e6} 2025/04/30 11:04:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 client -> Sending packet 2 (52 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 188.1µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:07 client -> Sending packet 3 (44 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:07 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client <- &wire.PingFrame{} 2025/04/30 11:04:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:07 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:07 client -> Sending packet 4 (32 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.215506ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:07 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:07 client newly acked packets (1): [3] 2025/04/30 11:04:07 client updated RTT: 33.674ms (σ: 13.602ms) 2025/04/30 11:04:07 client ECN capability confirmed. 2025/04/30 11:04:07 client Canceling loss detection timer. 2025/04/30 11:04:07 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:07 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:07 client -> Sending packet 5 (26 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 client Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:07 client Connection 4670bb1fdbf8f724cae6 closed. 2025/04/30 11:04:07 Requesting https://server4:443/nijxbpjyfi. 2025/04/30 11:04:07 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:07 Increased send buffer size to 14336 kiB 2025/04/30 11:04:07 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:07 Created qlog file: /logs/qlog/6ec9690979fcebd791b92edc150869.sqlog 2025/04/30 11:04:07 client Starting new connection to server4 ([::]:43455 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6ec9690979fcebd791b92edc150869, version v1 2025/04/30 11:04:07 Adding connection ID (empty). 2025/04/30 11:04:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:07 client -> Sending packet 0 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 6ec9690979fcebd791b92edc150869, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 client -> Sending packet 1 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 6ec9690979fcebd791b92edc150869, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:07 client -> Sending packet 2 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 client Long Header{Type: Initial, DestConnectionID: 6ec9690979fcebd791b92edc150869, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:08 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 client Received first packet. Switching destination connection ID to: 9dd2bcb9 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client -> Sending packet 3 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 9dd2bcb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 client -> Sending packet 4 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 9dd2bcb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 client <- Reading packet 3 (37 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client <- Reading packet 2 (742 bytes) for connection (empty), Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:04:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6ec9690979fcebd791b92edc150869, InitialSourceConnectionID: 9dd2bcb9, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x2d831424dcc95f4e8c641a531566aa94} 2025/04/30 11:04:08 client -> Sending packet 0 (75 bytes) for connection 6ec9690979fcebd791b92edc150869, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 9dd2bcb9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client Dropping Initial keys. 2025/04/30 11:04:08 client -> Sending packet 0 (42 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: 9dd2bcb9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:08 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.NewTokenFrame{Token: 0xba69b44f2d59d99e6f6cf4a634d712cce0130996e915cf7f957b016c29e4e643082b06156e07c0b41a01faf0fd47b36bd67ba70eae4b1c3befdf5d2ff48074f0c084f19dff95585665ccfee9fbce59068b908ebb8994} 2025/04/30 11:04:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 client Dropping Handshake keys. 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d44b72ba, StatelessResetToken: 0xec3ff271cd7bafbebfad84ed914b1411} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99cb0fb5, StatelessResetToken: 0x34445ffd7425f9900f0f4fa96abfe83d} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8001e0f3, StatelessResetToken: 0x2fbe236dac15bf2ca45e9ca30585c95b} 2025/04/30 11:04:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 client -> Sending packet 1 (1366 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: d44b72ba, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.PingFrame{} 2025/04/30 11:04:08 client -> Sending packet 2 (33 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: d44b72ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 186.928µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99cb0fb5, StatelessResetToken: 0x34445ffd7425f9900f0f4fa96abfe83d} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d44b72ba, StatelessResetToken: 0xec3ff271cd7bafbebfad84ed914b1411} 2025/04/30 11:04:08 client <- &wire.NewTokenFrame{Token: 0xba69b44f2d59d99e6f6cf4a634d712cce0130996e915cf7f957b016c29e4e643082b06156e07c0b41a01faf0fd47b36bd67ba70eae4b1c3befdf5d2ff48074f0c084f19dff95585665ccfee9fbce59068b908ebb8994} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8001e0f3, StatelessResetToken: 0x2fbe236dac15bf2ca45e9ca30585c95b} 2025/04/30 11:04:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client newly acked packets (1): [0] 2025/04/30 11:04:08 client updated RTT: 31.58778ms (σ: 15.79389ms) 2025/04/30 11:04:08 client ECN capability confirmed. 2025/04/30 11:04:08 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:08 client -> Sending packet 3 (31 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: d44b72ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 66.905µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:08 client -> Sending packet 4 (26 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: d44b72ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:08 client Connection 6ec9690979fcebd791b92edc150869 closed. 2025/04/30 11:04:08 Requesting https://server4:443/zrwvozvweb. 2025/04/30 11:04:08 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:08 Increased send buffer size to 14336 kiB 2025/04/30 11:04:08 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/5ade30b441ea3a109dae95043013babc02c9.sqlog 2025/04/30 11:04:08 client Starting new connection to server4 ([::]:53628 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5ade30b441ea3a109dae95043013babc02c9, version v1 2025/04/30 11:04:08 Adding connection ID (empty). 2025/04/30 11:04:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:08 client -> Sending packet 0 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 5ade30b441ea3a109dae95043013babc02c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 client -> Sending packet 1 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 5ade30b441ea3a109dae95043013babc02c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:08 client -> Sending packet 2 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 5ade30b441ea3a109dae95043013babc02c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:08 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 client Received first packet. Switching destination connection ID to: 16cc2fa7 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client -> Sending packet 3 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 16cc2fa7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:08 client <- Reading packet 1 (754 bytes) for connection (empty), Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5ade30b441ea3a109dae95043013babc02c9, InitialSourceConnectionID: 16cc2fa7, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xd9ed72257f4205f4e5f61e838c4df9bf} 2025/04/30 11:04:08 client -> Sending packet 0 (75 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 16cc2fa7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client Dropping Initial keys. 2025/04/30 11:04:08 client -> Sending packet 0 (42 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: 16cc2fa7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 client <- Reading packet 2 (754 bytes) for connection (empty), Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, PacketNumber: 2, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:08 client -> Sending packet 1 (36 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 16cc2fa7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 client <- Reading packet 2 (331 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client Peer doesn't await address validation any longer. 2025/04/30 11:04:08 client newly acked packets (1): [0] 2025/04/30 11:04:08 client updated RTT: 31.379101ms (σ: 15.68955ms) 2025/04/30 11:04:08 client ECN capability confirmed. 2025/04/30 11:04:08 client Canceling loss detection timer. 2025/04/30 11:04:08 client Dropping Handshake keys. 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05efd8f2, StatelessResetToken: 0xd8e5e8ac4a97ce2e3c5c8e3de6d10ea5} 2025/04/30 11:04:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 client <- &wire.NewTokenFrame{Token: 0x429da7c19d05b92d5710ad3486989a8f80d5d73807452b1d98c426bfaca6d59ed484b66cb4f2091a9656775d0fd31af6ece45b5b79b4416a251b695baf768fc7f81f3732ec21d4572f68a9af901ce887bfd0fc3c2726} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9cf2ab29, StatelessResetToken: 0x04c7404c6e7d580b66b2ee6d927bda77} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4c3f5a5, StatelessResetToken: 0xa1fa59150ee8d5b24bedb9902318ed4c} 2025/04/30 11:04:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 client -> Sending packet 1 (33 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e4c3f5a5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 233.084µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05efd8f2, StatelessResetToken: 0xd8e5e8ac4a97ce2e3c5c8e3de6d10ea5} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9cf2ab29, StatelessResetToken: 0x04c7404c6e7d580b66b2ee6d927bda77} 2025/04/30 11:04:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4c3f5a5, StatelessResetToken: 0xa1fa59150ee8d5b24bedb9902318ed4c} 2025/04/30 11:04:08 client <- &wire.NewTokenFrame{Token: 0x429da7c19d05b92d5710ad3486989a8f80d5d73807452b1d98c426bfaca6d59ed484b66cb4f2091a9656775d0fd31af6ece45b5b79b4416a251b695baf768fc7f81f3732ec21d4572f68a9af901ce887bfd0fc3c2726} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:08 client -> Sending packet 2 (31 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e4c3f5a5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 59.651µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:08 client -> Sending packet 3 (26 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e4c3f5a5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:08 client Connection 5ade30b441ea3a109dae95043013babc02c9 closed. 2025/04/30 11:04:08 Requesting https://server4:443/ecjczmgdsp. 2025/04/30 11:04:08 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:08 Increased send buffer size to 14336 kiB 2025/04/30 11:04:08 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/ee0990a6f33a324c6bfb231ef350bc5d392ce9.sqlog 2025/04/30 11:04:08 client Starting new connection to server4 ([::]:33796 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ee0990a6f33a324c6bfb231ef350bc5d392ce9, version v1 2025/04/30 11:04:08 Adding connection ID (empty). 2025/04/30 11:04:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:08 client -> Sending packet 0 (1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: ee0990a6f33a324c6bfb231ef350bc5d392ce9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 client -> Sending packet 1 (1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: ee0990a6f33a324c6bfb231ef350bc5d392ce9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:08 client -> Sending packet 2 (1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: ee0990a6f33a324c6bfb231ef350bc5d392ce9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:08 client Parsed a coalesced packet. Part 1: 446 bytes. Remaining: 834 bytes. 2025/04/30 11:04:08 client <- Reading packet 0 (446 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d8e356a6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:04:08 client Received first packet. Switching destination connection ID to: d8e356a6 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 91 bytes. 2025/04/30 11:04:08 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d8e356a6, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ee0990a6f33a324c6bfb231ef350bc5d392ce9, InitialSourceConnectionID: d8e356a6, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x7e06111041a1742c6255efdef5fe36d4} 2025/04/30 11:04:08 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8c2a387e, StatelessResetToken: 0xba4d4f48e9fd9c18e65b57ce8bf78375} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 193c5d1b, StatelessResetToken: 0x1243b4892fe723c2bbf73bff2500c6f1} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6b506de4, StatelessResetToken: 0x11eda3697e6e1fc805696ac657c801b8} 2025/04/30 11:04:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 client <- Reading packet 1 (37 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d8e356a6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 client newly acked packets (1): [2] 2025/04/30 11:04:08 client updated RTT: 33.893275ms (σ: 16.946637ms) 2025/04/30 11:04:08 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 6b506de4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 6b506de4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client Short Header{DestConnectionID: 6b506de4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 client Dropping Initial keys. 2025/04/30 11:04:08 client -> Sending packet 1 (36 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 6b506de4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client -> Sending packet 1 (29 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: 6b506de4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776.888µs} 2025/04/30 11:04:08 client <- Reading packet 2 (1280 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 480µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client Peer doesn't await address validation any longer. 2025/04/30 11:04:08 client newly acked packets (1): [0] 2025/04/30 11:04:08 client Canceling loss detection timer. 2025/04/30 11:04:08 client Dropping Handshake keys. 2025/04/30 11:04:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:08 client <- &wire.NewTokenFrame{Token: 0xb02c96bb36f8d2cb39c71291a351408a1ccce6c11eba3172c644535e12f360547477c93b9fa8b4852d730e71238c65b1d9721f5b0d5dfb70770e03fe4587ccf200f7a7f39ab23e63217e2abcee71dab6397363e5c06b} 2025/04/30 11:04:08 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:04:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:08 client -> Sending packet 2 (33 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: 6b506de4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 111.788µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client <- Reading packet 3 (25 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1022, Data length: 2, Offset + Data length: 1024} 2025/04/30 11:04:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:08 client -> Sending packet 3 (26 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: 6b506de4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:08 client Connection ee0990a6f33a324c6bfb231ef350bc5d392ce9 closed. 2025/04/30 11:04:08 Requesting https://server4:443/dgztpfetks. 2025/04/30 11:04:08 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:08 Increased send buffer size to 14336 kiB 2025/04/30 11:04:08 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/f8f6acd80593a60aeea19d8f22.sqlog 2025/04/30 11:04:08 client Starting new connection to server4 ([::]:33463 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f8f6acd80593a60aeea19d8f22, version v1 2025/04/30 11:04:08 Adding connection ID (empty). 2025/04/30 11:04:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:08 client -> Sending packet 0 (1280 bytes) for connection f8f6acd80593a60aeea19d8f22, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: f8f6acd80593a60aeea19d8f22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:08 client Parsed a coalesced packet. Part 1: 449 bytes. Remaining: 831 bytes. 2025/04/30 11:04:08 client <- Reading packet 0 (449 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17147fc6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:04:08 client Received first packet. Switching destination connection ID to: 17147fc6 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client newly acked packets (1): [0] 2025/04/30 11:04:08 client updated RTT: 33.447813ms (σ: 16.723906ms) 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Parsed a coalesced packet. Part 2: 740 bytes. Remaining: 91 bytes. 2025/04/30 11:04:08 client <- Reading packet 0 (740 bytes) for connection (empty), Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17147fc6, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:04:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f8f6acd80593a60aeea19d8f22, InitialSourceConnectionID: 17147fc6, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x85a2bc2f75ad1f6be0c636221f93987d} 2025/04/30 11:04:08 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d81b959, StatelessResetToken: 0x48d139cd59af78f42831f1613c4a1775} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5cd7462, StatelessResetToken: 0x5b22f7ab56e43e5ad552c0cd4208de69} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 283a1c0a, StatelessResetToken: 0x4795334667cfacf91282ae1d28308377} 2025/04/30 11:04:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f8f6acd80593a60aeea19d8f22 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: e5cd7462, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: e5cd7462, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client Short Header{DestConnectionID: e5cd7462, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 client Dropping Initial keys. 2025/04/30 11:04:08 client -> Sending packet 1 (78 bytes) for connection f8f6acd80593a60aeea19d8f22, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: e5cd7462, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client Short Header{DestConnectionID: e5cd7462, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 client -> Sending packet 2 (29 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e5cd7462, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 746.793µs} 2025/04/30 11:04:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 client -> Sending packet 2 (70 bytes) for connection f8f6acd80593a60aeea19d8f22, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: e5cd7462, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client -> Sending packet 3 (70 bytes) for connection f8f6acd80593a60aeea19d8f22, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: e5cd7462, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client <- Reading packet 1 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.PingFrame{} 2025/04/30 11:04:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 client <- Reading packet 2 (248 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 client Dropping Handshake keys. 2025/04/30 11:04:08 client <- &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 client -> Sending packet 4 (33 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e5cd7462, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 131.625µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 client Skipping packet number 3 2025/04/30 11:04:08 client -> Sending packet 5 (42 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e5cd7462, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 client <- Reading packet 3 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:08 client newly acked packets (1): [5] 2025/04/30 11:04:08 client updated RTT: 33.115ms (σ: 13.206ms) 2025/04/30 11:04:08 client ECN capability confirmed. 2025/04/30 11:04:08 client setting loss timer for packet 4 (1-RTT) to 37.254375ms (in 2025-04-30 11:04:08.85929565 +0000 UTC m=+13.378209077) 2025/04/30 11:04:08 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:08 client -> Sending packet 6 (26 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: e5cd7462, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:08 client Connection f8f6acd80593a60aeea19d8f22 closed. 2025/04/30 11:04:08 Requesting https://server4:443/tskoxxvlbj. 2025/04/30 11:04:08 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:08 Increased send buffer size to 14336 kiB 2025/04/30 11:04:08 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/617bf09eb577ad67717d44977d9868538b15.sqlog 2025/04/30 11:04:08 client Starting new connection to server4 ([::]:57041 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 617bf09eb577ad67717d44977d9868538b15, version v1 2025/04/30 11:04:08 Adding connection ID (empty). 2025/04/30 11:04:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:08 client -> Sending packet 0 (1280 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 617bf09eb577ad67717d44977d9868538b15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:08 client Parsed a coalesced packet. Part 1: 436 bytes. Remaining: 844 bytes. 2025/04/30 11:04:08 client <- Reading packet 0 (436 bytes) for connection (empty), Initial 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23d1f896, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 422, Version: v1} 2025/04/30 11:04:08 client Received first packet. Switching destination connection ID to: 23d1f896 2025/04/30 11:04:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client newly acked packets (1): [0] 2025/04/30 11:04:08 client updated RTT: 33.341993ms (σ: 16.670996ms) 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 91 bytes. 2025/04/30 11:04:08 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23d1f896, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:04:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:04:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 617bf09eb577ad67717d44977d9868538b15, InitialSourceConnectionID: 23d1f896, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xef49be9518b102e0e5fc76fd81e4130b} 2025/04/30 11:04:08 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 819f89bf, StatelessResetToken: 0x25cec408181bdd8d57216707a838c509} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8cb88032, StatelessResetToken: 0x499f56ca97f885ce6c67da01282d620b} 2025/04/30 11:04:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dbce0abb, StatelessResetToken: 0x41238c4e7becf55670206cfee1695d13} 2025/04/30 11:04:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 617bf09eb577ad67717d44977d9868538b15 2025/04/30 11:04:08 client Long Header{Type: Initial, DestConnectionID: 819f89bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 819f89bf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client Short Header{DestConnectionID: 819f89bf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 client Dropping Initial keys. 2025/04/30 11:04:08 client -> Sending packet 1 (36 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 819f89bf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 client -> Sending packet 1 (48 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 client Short Header{DestConnectionID: 819f89bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 654.761µs} 2025/04/30 11:04:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 client -> Sending packet 2 (70 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 819f89bf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 client -> Sending packet 3 (70 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, Handshake 2025/04/30 11:04:08 client Long Header{Type: Handshake, DestConnectionID: 819f89bf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:09 client <- Reading packet 1 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client <- &wire.PingFrame{} 2025/04/30 11:04:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:09 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:09 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:09 client -> Sending packet 2 (33 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 client Short Header{DestConnectionID: 819f89bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 59.171µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:09 client -> Sending packet 4 (61 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, Handshake 2025/04/30 11:04:09 client Long Header{Type: Handshake, DestConnectionID: 819f89bf, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 11:04:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:09 client Short Header{DestConnectionID: 819f89bf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:09 client Connection 617bf09eb577ad67717d44977d9868538b15 closed. 2025/04/30 11:04:09 Requesting https://server4:443/osoxapkxrz. 2025/04/30 11:04:09 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:09 Increased send buffer size to 14336 kiB 2025/04/30 11:04:09 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:09 Created qlog file: /logs/qlog/00628a2e17ff4e531c22ca73aeea.sqlog 2025/04/30 11:04:09 client Starting new connection to server4 ([::]:47955 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 00628a2e17ff4e531c22ca73aeea, version v1 2025/04/30 11:04:09 Adding connection ID (empty). 2025/04/30 11:04:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:09 client -> Sending packet 0 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:09 client -> Sending packet 1 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 client -> Sending packet 2 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:04:09 client -> Sending packet 3 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 client -> Sending packet 4 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 client Parsed a coalesced packet. Part 1: 446 bytes. Remaining: 834 bytes. 2025/04/30 11:04:09 client <- Reading packet 0 (446 bytes) for connection (empty), Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5d7c5f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:04:09 client Received first packet. Switching destination connection ID to: e5d7c5f6 2025/04/30 11:04:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:04:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 client Parsed a coalesced packet. Part 2: 743 bytes. Remaining: 91 bytes. 2025/04/30 11:04:09 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/04/30 11:04:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5d7c5f6, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 00628a2e17ff4e531c22ca73aeea, InitialSourceConnectionID: e5d7c5f6, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa71c33f07658b65214df4816233be50e} 2025/04/30 11:04:09 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5bb510fe, StatelessResetToken: 0x50bffd150d96a3e80eb6b29c68b097bf} 2025/04/30 11:04:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c7acec9, StatelessResetToken: 0xd1aa9d1739f25cdb52315b14538bde49} 2025/04/30 11:04:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34c25270, StatelessResetToken: 0x98e17ce5e438307976be9361950409f6} 2025/04/30 11:04:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 34c25270, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:09 client Long Header{Type: Handshake, DestConnectionID: 34c25270, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:09 client Short Header{DestConnectionID: 34c25270, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:09 client Dropping Initial keys. 2025/04/30 11:04:09 client Dropping %!s(logging.PacketType=0) packet (37 bytes) because we already dropped the keys. 2025/04/30 11:04:09 client -> Sending packet 1 (36 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Handshake 2025/04/30 11:04:09 client Long Header{Type: Handshake, DestConnectionID: 34c25270, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:09 client -> Sending packet 1 (48 bytes) for connection 00628a2e17ff4e531c22ca73aeea, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 client Short Header{DestConnectionID: 34c25270, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 781.007µs} 2025/04/30 11:04:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:09 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 11:04:09 client Peer doesn't await address validation any longer. 2025/04/30 11:04:09 client newly acked packets (1): [0] 2025/04/30 11:04:09 client updated RTT: 32.315676ms (σ: 16.157838ms) 2025/04/30 11:04:09 client Dropping Handshake keys. 2025/04/30 11:04:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:09 client <- &wire.NewTokenFrame{Token: 0x200323f4cc5694b233ddb03230d1a41a42bce1edbd60e8793270a95967b9e46ef6eed95c4334dea332df3a33de38735c86eb33b1766f29dc83ab744735eff1228040e3c1587b51fc3b9df426beaf3c178b93dd454104} 2025/04/30 11:04:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:09 client <- Reading packet 2 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 488µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:09 client newly acked packets (1): [1] 2025/04/30 11:04:09 client updated RTT: 32.347ms (σ: 12.181ms) 2025/04/30 11:04:09 client ECN capability confirmed. 2025/04/30 11:04:09 client Canceling loss detection timer. 2025/04/30 11:04:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:09 client Ignoring all packets below 1. 2025/04/30 11:04:09 client -> Sending packet 2 (31 bytes) for connection 00628a2e17ff4e531c22ca73aeea, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 client Short Header{DestConnectionID: 34c25270, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 118.561µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:09 client -> Sending packet 3 (26 bytes) for connection 00628a2e17ff4e531c22ca73aeea, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 client Short Header{DestConnectionID: 34c25270, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:09 client Connection 00628a2e17ff4e531c22ca73aeea closed. 2025/04/30 11:04:09 Requesting https://server4:443/pqqrrogwhr. 2025/04/30 11:04:09 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:09 Increased send buffer size to 14336 kiB 2025/04/30 11:04:09 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:09 Created qlog file: /logs/qlog/43afd600d848a2694a.sqlog 2025/04/30 11:04:09 client Starting new connection to server4 ([::]:60959 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 43afd600d848a2694a, version v1 2025/04/30 11:04:09 Adding connection ID (empty). 2025/04/30 11:04:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:09 client -> Sending packet 0 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 43afd600d848a2694a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:09 client -> Sending packet 1 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 43afd600d848a2694a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:09 client -> Sending packet 2 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: 43afd600d848a2694a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:09 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 client Received first packet. Switching destination connection ID to: afa23e99 2025/04/30 11:04:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 client -> Sending packet 3 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: afa23e99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:09 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 client -> Sending packet 4 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: afa23e99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:09 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/04/30 11:04:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:04:09 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:04:09 client newly acked packets (1): [2] 2025/04/30 11:04:09 client updated RTT: 34.035008ms (σ: 17.017504ms) 2025/04/30 11:04:10 client <- Reading packet 1 (738 bytes) for connection (empty), Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: afa23e99, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:04:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 43afd600d848a2694a, InitialSourceConnectionID: afa23e99, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x3d9edf07c5866a53b3ad99ed3f4301e3} 2025/04/30 11:04:10 client -> Sending packet 0 (75 bytes) for connection 43afd600d848a2694a, Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: afa23e99, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:10 client Dropping Initial keys. 2025/04/30 11:04:10 client -> Sending packet 0 (42 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: afa23e99, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 client <- Reading packet 2 (738 bytes) for connection (empty), Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: afa23e99, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:04:10 client -> Sending packet 1 (36 bytes) for connection 43afd600d848a2694a, Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: afa23e99, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 client Dropping Handshake keys. 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 469d5a52, StatelessResetToken: 0x1d518f06155e9333ce4cab7354661bd5} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e59a810b, StatelessResetToken: 0x5b7161ee7446695ce7986ba088a37471} 2025/04/30 11:04:10 client <- &wire.NewTokenFrame{Token: 0x20eedb1a5f6b70ae8455db7495193203031e940006c976b7875661b5dc9d3be591807b86a1d9a303fe61b166ae6dc85567fec3ab8ff6b8e1d8cd703a58fe9c6a9274f8386b525a6532866625e95c06a86567e14f3d69} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f2a23bd, StatelessResetToken: 0xcbb055aecf685330cbbc33f9634b108b} 2025/04/30 11:04:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:10 client -> Sending packet 1 (33 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 469d5a52, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 115.806µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.PingFrame{} 2025/04/30 11:04:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:10 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:10 client -> Sending packet 2 (32 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 469d5a52, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.22788ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 client -> Sending packet 4 (42 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 469d5a52, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 client Skipping packet number 3 2025/04/30 11:04:10 client -> Sending packet 5 (25 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 469d5a52, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 client <- Reading packet 7 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client newly acked packets (2): [4 5] 2025/04/30 11:04:10 client updated RTT: 33.772ms (σ: 13.286ms) 2025/04/30 11:04:10 client ECN capability confirmed. 2025/04/30 11:04:10 client Canceling loss detection timer. 2025/04/30 11:04:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:10 client -> Sending packet 6 (33 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 469d5a52, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 144.089µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:10 client -> Sending packet 7 (26 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 469d5a52, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:10 client Connection 43afd600d848a2694a closed. 2025/04/30 11:04:10 Requesting https://server4:443/usatfeydkb. 2025/04/30 11:04:10 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:10 Increased send buffer size to 14336 kiB 2025/04/30 11:04:10 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:10 Created qlog file: /logs/qlog/962b1b5198ee6b2a70539b2f33dde1211d.sqlog 2025/04/30 11:04:10 client Starting new connection to server4 ([::]:38435 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 962b1b5198ee6b2a70539b2f33dde1211d, version v1 2025/04/30 11:04:10 Adding connection ID (empty). 2025/04/30 11:04:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:10 client -> Sending packet 0 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 962b1b5198ee6b2a70539b2f33dde1211d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:04:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 client -> Sending packet 1 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 962b1b5198ee6b2a70539b2f33dde1211d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:04:10 client -> Sending packet 2 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 962b1b5198ee6b2a70539b2f33dde1211d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:04:10 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 client Received first packet. Switching destination connection ID to: 3f0a3e78 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client -> Sending packet 3 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 3f0a3e78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 client -> Sending packet 4 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 3f0a3e78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 client <- Reading packet 1 (745 bytes) for connection (empty), Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:04:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 962b1b5198ee6b2a70539b2f33dde1211d, InitialSourceConnectionID: 3f0a3e78, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc39cda41e971549ebd8ab43f0201be49} 2025/04/30 11:04:10 client -> Sending packet 0 (75 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: 3f0a3e78, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:10 client Dropping Initial keys. 2025/04/30 11:04:10 client -> Sending packet 0 (42 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 3f0a3e78, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 client <- Reading packet 2 (745 bytes) for connection (empty), Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:04:10 client -> Sending packet 1 (36 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: 3f0a3e78, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:10 client <- Reading packet 2 (331 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client Peer doesn't await address validation any longer. 2025/04/30 11:04:10 client newly acked packets (1): [0] 2025/04/30 11:04:10 client updated RTT: 31.332937ms (σ: 15.666468ms) 2025/04/30 11:04:10 client ECN capability confirmed. 2025/04/30 11:04:10 client Canceling loss detection timer. 2025/04/30 11:04:10 client Dropping Handshake keys. 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be298371, StatelessResetToken: 0x4e2975a292ae4e2dc1907e42e335b35e} 2025/04/30 11:04:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 client <- &wire.NewTokenFrame{Token: 0xf3f1223d13bb5f374c6d2889c9ffe3e147f0e9d50e63d7ceb381e84bf2a0aebfb05ac6e652f2a2c98748f91bc67e613f89cc9b715e8da9daf8795fb2fb3db7eefb83467b5527b4f2919b2122e37937df8a4efb889e87} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 01b5ab7f, StatelessResetToken: 0x2ea8edefaeaebb3d78f789d216fbfff1} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cad309a2, StatelessResetToken: 0x32923d357b2475cc4dc08363a4c3e94d} 2025/04/30 11:04:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:10 client -> Sending packet 1 (33 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: be298371, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 176.499µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.NewTokenFrame{Token: 0xf3f1223d13bb5f374c6d2889c9ffe3e147f0e9d50e63d7ceb381e84bf2a0aebfb05ac6e652f2a2c98748f91bc67e613f89cc9b715e8da9daf8795fb2fb3db7eefb83467b5527b4f2919b2122e37937df8a4efb889e87} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be298371, StatelessResetToken: 0x4e2975a292ae4e2dc1907e42e335b35e} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cad309a2, StatelessResetToken: 0x32923d357b2475cc4dc08363a4c3e94d} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 01b5ab7f, StatelessResetToken: 0x2ea8edefaeaebb3d78f789d216fbfff1} 2025/04/30 11:04:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:10 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:10 client -> Sending packet 2 (31 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: be298371, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 67.265µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:10 client -> Sending packet 3 (26 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: be298371, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:10 client Connection 962b1b5198ee6b2a70539b2f33dde1211d closed. 2025/04/30 11:04:10 Requesting https://server4:443/fytpweqqzv. 2025/04/30 11:04:10 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:10 Increased send buffer size to 14336 kiB 2025/04/30 11:04:10 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:10 Created qlog file: /logs/qlog/6732ec28cba69c12f4105de2.sqlog 2025/04/30 11:04:10 client Starting new connection to server4 ([::]:34895 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6732ec28cba69c12f4105de2, version v1 2025/04/30 11:04:10 Adding connection ID (empty). 2025/04/30 11:04:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:10 client -> Sending packet 0 (1280 bytes) for connection 6732ec28cba69c12f4105de2, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 6732ec28cba69c12f4105de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 client -> Sending packet 1 (1280 bytes) for connection 6732ec28cba69c12f4105de2, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 6732ec28cba69c12f4105de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:10 client -> Sending packet 2 (1280 bytes) for connection 6732ec28cba69c12f4105de2, Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 6732ec28cba69c12f4105de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:10 client Parsed a coalesced packet. Part 1: 438 bytes. Remaining: 842 bytes. 2025/04/30 11:04:10 client <- Reading packet 0 (438 bytes) for connection (empty), Initial 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5421e18c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 424, Version: v1} 2025/04/30 11:04:10 client Received first packet. Switching destination connection ID to: 5421e18c 2025/04/30 11:04:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 91 bytes. 2025/04/30 11:04:10 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5421e18c, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 11:04:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6732ec28cba69c12f4105de2, InitialSourceConnectionID: 5421e18c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x36bb8b82a6aa818f27b7062aac578697} 2025/04/30 11:04:10 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 56e9a0be, StatelessResetToken: 0xa6477f047beeabfd6c23b4dcda3800cd} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4f8cb14, StatelessResetToken: 0xf4460a88a2439bf589073f6a5faa71f6} 2025/04/30 11:04:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34dec8ed, StatelessResetToken: 0xd8c3d2c6c7df36db5ff5a4cc2ec0edfd} 2025/04/30 11:04:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6732ec28cba69c12f4105de2 2025/04/30 11:04:10 client Long Header{Type: Initial, DestConnectionID: 34dec8ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: 34dec8ed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:10 client Short Header{DestConnectionID: 34dec8ed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 client Dropping Initial keys. 2025/04/30 11:04:10 client -> Sending packet 1 (36 bytes) for connection 6732ec28cba69c12f4105de2, Handshake 2025/04/30 11:04:10 client Long Header{Type: Handshake, DestConnectionID: 34dec8ed, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:10 client -> Sending packet 1 (48 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 34dec8ed, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 664.629µs} 2025/04/30 11:04:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:10 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 11:04:10 client Peer doesn't await address validation any longer. 2025/04/30 11:04:10 client newly acked packets (1): [0] 2025/04/30 11:04:10 client updated RTT: 32.248663ms (σ: 16.124331ms) 2025/04/30 11:04:10 client Dropping Handshake keys. 2025/04/30 11:04:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 client <- &wire.NewTokenFrame{Token: 0x0eccc7eb3cb73842ba245fdfe824ec905e34cf39057517e2685f822add231a856209bfeb75f144b452cbcde1bad08cde7da52d6fca3f4135889f3710ec3a2f6405e2c327165c2ce255b8847740d0b1c00c26c44ba7ed} 2025/04/30 11:04:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:10 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:10 client -> Sending packet 2 (32 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 34dec8ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.379571ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 client -> Sending packet 4 (42 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 34dec8ed, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 client -> Sending packet 5 (42 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 client Short Header{DestConnectionID: 34dec8ed, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 client <- Reading packet 2 (29 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 128µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:11 client newly acked packets (1): [5] 2025/04/30 11:04:11 client updated RTT: 32.096ms (σ: 12.396ms) 2025/04/30 11:04:11 client ECN capability confirmed. 2025/04/30 11:04:11 client Canceling loss detection timer. 2025/04/30 11:04:11 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:11 client -> Sending packet 6 (26 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 34dec8ed, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:11 client Connection 6732ec28cba69c12f4105de2 closed. 2025/04/30 11:04:11 Requesting https://server4:443/dtoqhmgbot. 2025/04/30 11:04:11 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:11 Increased send buffer size to 14336 kiB 2025/04/30 11:04:11 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:11 Created qlog file: /logs/qlog/060663489778f634f053ebc6b3189fc7.sqlog 2025/04/30 11:04:11 client Starting new connection to server4 ([::]:54688 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 060663489778f634f053ebc6b3189fc7, version v1 2025/04/30 11:04:11 Adding connection ID (empty). 2025/04/30 11:04:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:11 client -> Sending packet 0 (1280 bytes) for connection 060663489778f634f053ebc6b3189fc7, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 060663489778f634f053ebc6b3189fc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:11 client -> Sending packet 1 (1280 bytes) for connection 060663489778f634f053ebc6b3189fc7, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 060663489778f634f053ebc6b3189fc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:11 client -> Sending packet 2 (1280 bytes) for connection 060663489778f634f053ebc6b3189fc7, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 060663489778f634f053ebc6b3189fc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:11 client Parsed a coalesced packet. Part 1: 436 bytes. Remaining: 844 bytes. 2025/04/30 11:04:11 client <- Reading packet 0 (436 bytes) for connection (empty), Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4f9b94d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 422, Version: v1} 2025/04/30 11:04:11 client Received first packet. Switching destination connection ID to: 4f9b94d2 2025/04/30 11:04:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:11 client newly acked packets (1): [2] 2025/04/30 11:04:11 client updated RTT: 34.675558ms (σ: 17.337779ms) 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 91 bytes. 2025/04/30 11:04:11 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4f9b94d2, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:04:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 060663489778f634f053ebc6b3189fc7, InitialSourceConnectionID: 4f9b94d2, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x84f849b21620ba05c77420f8bb941c77} 2025/04/30 11:04:11 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ca606cb3, StatelessResetToken: 0x72592254afa8e79344ef2f2f0548e489} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e5d0f19, StatelessResetToken: 0x9a777fda5ef13a2e0d6dbb7a69d9b33f} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f615409, StatelessResetToken: 0x474bdf9b712a69cf246ad26185edd12a} 2025/04/30 11:04:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 060663489778f634f053ebc6b3189fc7 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 7e5d0f19, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: 7e5d0f19, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:11 client Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 client Dropping Initial keys. 2025/04/30 11:04:11 client -> Sending packet 1 (36 bytes) for connection 060663489778f634f053ebc6b3189fc7, Handshake 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: 7e5d0f19, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 client -> Sending packet 1 (29 bytes) for connection 060663489778f634f053ebc6b3189fc7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 817.603µs} 2025/04/30 11:04:11 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 11:04:11 client Peer doesn't await address validation any longer. 2025/04/30 11:04:11 client newly acked packets (1): [0] 2025/04/30 11:04:11 client updated RTT: 34.426ms (σ: 13.5ms) 2025/04/30 11:04:11 client Canceling loss detection timer. 2025/04/30 11:04:11 client Dropping Handshake keys. 2025/04/30 11:04:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:11 client <- &wire.NewTokenFrame{Token: 0xc6a43d016718f4b457bc355da9a19206dcbc64f21bc106e2cd458b3bbefb390b93cf9adc0117b35854ad7ccb55bc2ac7f49b9ca72f3f1afa803f7fa45e666af9b3f2873106591b9766eaab75d19c92a69e81cf9f1216} 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:11 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:11 client -> Sending packet 2 (31 bytes) for connection 060663489778f634f053ebc6b3189fc7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 68.487µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:11 client -> Sending packet 3 (26 bytes) for connection 060663489778f634f053ebc6b3189fc7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:11 client Connection 060663489778f634f053ebc6b3189fc7 closed. 2025/04/30 11:04:11 Requesting https://server4:443/nihiovkmyl. 2025/04/30 11:04:11 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:11 Increased send buffer size to 14336 kiB 2025/04/30 11:04:11 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:11 Created qlog file: /logs/qlog/3978336264ec6417.sqlog 2025/04/30 11:04:11 client Starting new connection to server4 ([::]:55540 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3978336264ec6417, version v1 2025/04/30 11:04:11 Adding connection ID (empty). 2025/04/30 11:04:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:11 client -> Sending packet 0 (1280 bytes) for connection 3978336264ec6417, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 3978336264ec6417, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:11 client Parsed a coalesced packet. Part 1: 448 bytes. Remaining: 832 bytes. 2025/04/30 11:04:11 client <- Reading packet 0 (448 bytes) for connection (empty), Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8cf1ea6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:04:11 client Received first packet. Switching destination connection ID to: 8cf1ea6e 2025/04/30 11:04:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 client newly acked packets (1): [0] 2025/04/30 11:04:11 client updated RTT: 33.391613ms (σ: 16.695806ms) 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Parsed a coalesced packet. Part 2: 741 bytes. Remaining: 91 bytes. 2025/04/30 11:04:11 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8cf1ea6e, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:04:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3978336264ec6417, InitialSourceConnectionID: 8cf1ea6e, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe393a0b0b672fb7f4e1f67a3b2b71eaf} 2025/04/30 11:04:11 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d0eb9df, StatelessResetToken: 0x4a071ce59ecc09d3fed6936e9530175b} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c765aa66, StatelessResetToken: 0xd9753aef21497d932573093d111c2432} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55d57cff, StatelessResetToken: 0xda1d92f140bfd94c3d66c1ddec131063} 2025/04/30 11:04:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3978336264ec6417 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:11 client Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:11 client Dropping Initial keys. 2025/04/30 11:04:11 client -> Sending packet 1 (36 bytes) for connection 3978336264ec6417, Handshake 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 client -> Sending packet 1 (48 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 788.801µs} 2025/04/30 11:04:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:11 client -> Sending packet 2 (70 bytes) for connection 3978336264ec6417, Handshake 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:11 client -> Sending packet 3 (70 bytes) for connection 3978336264ec6417, Handshake 2025/04/30 11:04:11 client Long Header{Type: Handshake, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:11 client <- Reading packet 2 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c765aa66, StatelessResetToken: 0xd9753aef21497d932573093d111c2432} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d0eb9df, StatelessResetToken: 0x4a071ce59ecc09d3fed6936e9530175b} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55d57cff, StatelessResetToken: 0xda1d92f140bfd94c3d66c1ddec131063} 2025/04/30 11:04:11 client <- &wire.NewTokenFrame{Token: 0x3a0e06e180e4c11a28815e2aa0a3cefce5826ed460e7f5086bbf1f6b2ca60c3e80f05fbc531bec643e8a0cc2d68ebace01bfaa927fa76cb702f38143d8568cce0185043a399a137067ce1dda362812ad880864acc9cb} 2025/04/30 11:04:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:11 client Dropping Handshake keys. 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:11 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:11 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:11 client -> Sending packet 3 (35 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 146.914µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:11 client Skipping packet number 2 2025/04/30 11:04:11 client -> Sending packet 4 (42 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d0eb9df, StatelessResetToken: 0x4a071ce59ecc09d3fed6936e9530175b} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55d57cff, StatelessResetToken: 0xda1d92f140bfd94c3d66c1ddec131063} 2025/04/30 11:04:11 client <- &wire.NewTokenFrame{Token: 0x3a0e06e180e4c11a28815e2aa0a3cefce5826ed460e7f5086bbf1f6b2ca60c3e80f05fbc531bec643e8a0cc2d68ebace01bfaa927fa76cb702f38143d8568cce0185043a399a137067ce1dda362812ad880864acc9cb} 2025/04/30 11:04:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c765aa66, StatelessResetToken: 0xd9753aef21497d932573093d111c2432} 2025/04/30 11:04:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:11 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.12ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:11 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:11 client -> Sending packet 5 (33 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 59.221µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:11 client -> Sending packet 6 (26 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 client Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:11 client Connection 3978336264ec6417 closed. 2025/04/30 11:04:11 Requesting https://server4:443/kolkvyfphm. 2025/04/30 11:04:11 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:11 Increased send buffer size to 14336 kiB 2025/04/30 11:04:11 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:11 Created qlog file: /logs/qlog/d9b0ac925103b4dff54931ccc8d6.sqlog 2025/04/30 11:04:11 client Starting new connection to server4 ([::]:32914 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d9b0ac925103b4dff54931ccc8d6, version v1 2025/04/30 11:04:11 Adding connection ID (empty). 2025/04/30 11:04:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:11 client -> Sending packet 0 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: d9b0ac925103b4dff54931ccc8d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:11 client -> Sending packet 1 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: d9b0ac925103b4dff54931ccc8d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:11 client -> Sending packet 2 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: d9b0ac925103b4dff54931ccc8d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:11 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 587bc373, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:11 client Received first packet. Switching destination connection ID to: 587bc373 2025/04/30 11:04:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 client -> Sending packet 3 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 client Long Header{Type: Initial, DestConnectionID: 587bc373, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 11:04:12 client -> Sending packet 4 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: 587bc373, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 client -> Sending packet 5 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: 587bc373, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 client <- Reading packet 1 (743 bytes) for connection (empty), Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 587bc373, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d9b0ac925103b4dff54931ccc8d6, InitialSourceConnectionID: 587bc373, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x31e8d574feb38315c82e46e712550c12} 2025/04/30 11:04:12 client -> Sending packet 0 (75 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 587bc373, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client Dropping Initial keys. 2025/04/30 11:04:12 client -> Sending packet 0 (42 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 587bc373, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client <- Reading packet 2 (743 bytes) for connection (empty), Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 587bc373, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:12 client -> Sending packet 1 (36 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 587bc373, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:12 client Dropping %!s(logging.PacketType=0) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:04:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:12 client -> Sending packet 2 (70 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 587bc373, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client -> Sending packet 3 (70 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 587bc373, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client <- Reading packet 2 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: adca383d, StatelessResetToken: 0x1eb9a14ed0dfbc10def8e8711a505821} 2025/04/30 11:04:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 client Dropping Handshake keys. 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f7d70c9, StatelessResetToken: 0xfc2d7c7db00b8533b9e5955befbef69d} 2025/04/30 11:04:12 client <- &wire.NewTokenFrame{Token: 0x13011de6ee9c86661522ea30369a8fa6c68e6ba6faa14873ab4a12acfabed2253718c7b37ce4f4af141c5b79eea484b686e220e4e773dc1fb0d2ed4767c73797f702851dbc0d6c9d3053f138289a1f40199a845b73e2} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 358576eb, StatelessResetToken: 0x7a8493f73958d5c182a577c745925b57} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:12 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:12 client -> Sending packet 2 (52 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 136.795µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client -> Sending packet 3 (44 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client -> Sending packet 4 (1366 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.PingFrame{} 2025/04/30 11:04:12 client <- Reading packet 3 (320 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: adca383d, StatelessResetToken: 0x1eb9a14ed0dfbc10def8e8711a505821} 2025/04/30 11:04:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 358576eb, StatelessResetToken: 0x7a8493f73958d5c182a577c745925b57} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f7d70c9, StatelessResetToken: 0xfc2d7c7db00b8533b9e5955befbef69d} 2025/04/30 11:04:12 client <- &wire.NewTokenFrame{Token: 0x13011de6ee9c86661522ea30369a8fa6c68e6ba6faa14873ab4a12acfabed2253718c7b37ce4f4af141c5b79eea484b686e220e4e773dc1fb0d2ed4767c73797f702851dbc0d6c9d3053f138289a1f40199a845b73e2} 2025/04/30 11:04:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:12 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.PingFrame{} 2025/04/30 11:04:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:12 client -> Sending packet 5 (31 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 71.103µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client <- Reading packet 5 (30 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.12ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:12 client -> Sending packet 6 (26 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:12 client Connection d9b0ac925103b4dff54931ccc8d6 closed. 2025/04/30 11:04:12 Requesting https://server4:443/nnplcdywsk. 2025/04/30 11:04:12 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:12 Increased send buffer size to 14336 kiB 2025/04/30 11:04:12 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:12 Created qlog file: /logs/qlog/f1ccc4c9e5c1c8a98c.sqlog 2025/04/30 11:04:12 client Starting new connection to server4 ([::]:41211 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f1ccc4c9e5c1c8a98c, version v1 2025/04/30 11:04:12 Adding connection ID (empty). 2025/04/30 11:04:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:12 client -> Sending packet 0 (1280 bytes) for connection f1ccc4c9e5c1c8a98c, Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: f1ccc4c9e5c1c8a98c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 client Parsed a coalesced packet. Part 1: 454 bytes. Remaining: 826 bytes. 2025/04/30 11:04:12 client <- Reading packet 0 (454 bytes) for connection (empty), Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a5363214, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 440, Version: v1} 2025/04/30 11:04:12 client Received first packet. Switching destination connection ID to: a5363214 2025/04/30 11:04:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 client newly acked packets (1): [0] 2025/04/30 11:04:12 client updated RTT: 33.388256ms (σ: 16.694128ms) 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Parsed a coalesced packet. Part 2: 735 bytes. Remaining: 91 bytes. 2025/04/30 11:04:12 client <- Reading packet 0 (735 bytes) for connection (empty), Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a5363214, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:04:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f1ccc4c9e5c1c8a98c, InitialSourceConnectionID: a5363214, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x3d6555e537c5fddf7110ac9a1c9355bd} 2025/04/30 11:04:12 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5c0eda1, StatelessResetToken: 0x446694fae15e86c2af8e8c4a38c4abd0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23d53dc8, StatelessResetToken: 0x45e1cee2d9004ecb06cfb627a87f24a2} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41c36c73, StatelessResetToken: 0xa22cac2d063890d001e277b63b59a385} 2025/04/30 11:04:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f1ccc4c9e5c1c8a98c 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: 41c36c73, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 41c36c73, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 client Dropping Initial keys. 2025/04/30 11:04:12 client -> Sending packet 1 (36 bytes) for connection f1ccc4c9e5c1c8a98c, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 41c36c73, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 client -> Sending packet 1 (48 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 669.158µs} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:12 client -> Sending packet 2 (70 bytes) for connection f1ccc4c9e5c1c8a98c, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 41c36c73, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client -> Sending packet 3 (70 bytes) for connection f1ccc4c9e5c1c8a98c, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: 41c36c73, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client <- Reading packet 2 (248 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.NewTokenFrame{Token: 0xfa6b05bbb532988ed8be8ce9a43b12d0dc6600fe0ded47c5465a9d8a255a71469ffdc349268bfbbe50e9be6601c1d27b278d1312784446f1a123faec599977be44ef4ceade51c23906d46915748db34aaef3aed6abdf} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 client Dropping Handshake keys. 2025/04/30 11:04:12 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:12 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:12 client -> Sending packet 3 (35 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 115.326µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 client Skipping packet number 2 2025/04/30 11:04:12 client -> Sending packet 4 (42 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client <- Reading packet 4 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41c36c73, StatelessResetToken: 0xa22cac2d063890d001e277b63b59a385} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5c0eda1, StatelessResetToken: 0x446694fae15e86c2af8e8c4a38c4abd0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23d53dc8, StatelessResetToken: 0x45e1cee2d9004ecb06cfb627a87f24a2} 2025/04/30 11:04:12 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:12 client -> Sending packet 5 (1366 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.PingFrame{} 2025/04/30 11:04:12 client <- Reading packet 5 (248 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 client <- &wire.NewTokenFrame{Token: 0xfa6b05bbb532988ed8be8ce9a43b12d0dc6600fe0ded47c5465a9d8a255a71469ffdc349268bfbbe50e9be6601c1d27b278d1312784446f1a123faec599977be44ef4ceade51c23906d46915748db34aaef3aed6abdf} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 client -> Sending packet 6 (35 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56.363µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client <- Reading packet 6 (1323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.PingFrame{} 2025/04/30 11:04:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:12 client <- Reading packet 7 (27 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 208µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client newly acked packets (1): [5] 2025/04/30 11:04:12 client ECN capability confirmed. 2025/04/30 11:04:12 client lost packet 3 (time threshold) 2025/04/30 11:04:12 client lost packet 4 (time threshold) 2025/04/30 11:04:12 client Canceling loss detection timer. 2025/04/30 11:04:12 client -> Sending packet 7 (56 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 154.325µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client <- Reading packet 8 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 288µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client newly acked packets (1): [7] 2025/04/30 11:04:12 client updated RTT: 33.189ms (σ: 12.917ms) 2025/04/30 11:04:12 client Canceling loss detection timer. 2025/04/30 11:04:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:12 client Ignoring all packets below 8. 2025/04/30 11:04:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:12 client -> Sending packet 8 (26 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: 41c36c73, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:12 client Connection f1ccc4c9e5c1c8a98c closed. 2025/04/30 11:04:12 Requesting https://server4:443/fqacynadgo. 2025/04/30 11:04:12 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:12 Increased send buffer size to 14336 kiB 2025/04/30 11:04:12 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:12 Created qlog file: /logs/qlog/a45c9e1b711dbac6fb.sqlog 2025/04/30 11:04:12 client Starting new connection to server4 ([::]:35822 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a45c9e1b711dbac6fb, version v1 2025/04/30 11:04:12 Adding connection ID (empty). 2025/04/30 11:04:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:12 client -> Sending packet 0 (1280 bytes) for connection a45c9e1b711dbac6fb, Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: a45c9e1b711dbac6fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:12 client Parsed a coalesced packet. Part 1: 445 bytes. Remaining: 835 bytes. 2025/04/30 11:04:12 client <- Reading packet 0 (445 bytes) for connection (empty), Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8c65fcd5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:04:12 client Received first packet. Switching destination connection ID to: 8c65fcd5 2025/04/30 11:04:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 client newly acked packets (1): [0] 2025/04/30 11:04:12 client updated RTT: 33.417189ms (σ: 16.708594ms) 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Parsed a coalesced packet. Part 2: 744 bytes. Remaining: 91 bytes. 2025/04/30 11:04:12 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8c65fcd5, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a45c9e1b711dbac6fb, InitialSourceConnectionID: 8c65fcd5, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x73c95cd42dcb91dee6ac3bd962e75e78} 2025/04/30 11:04:12 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d436e6b8, StatelessResetToken: 0xaadd669a9ff2ad100076077f5f1a1008} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 890e23cd, StatelessResetToken: 0x59307af6beaacf097ea5c75ad4b3f286} 2025/04/30 11:04:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ab90a3c0, StatelessResetToken: 0xd43b95a03c35ebf4cb4748e6ff6578f1} 2025/04/30 11:04:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a45c9e1b711dbac6fb 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: ab90a3c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: ab90a3c0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 client Short Header{DestConnectionID: ab90a3c0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 client Dropping Initial keys. 2025/04/30 11:04:12 client -> Sending packet 1 (78 bytes) for connection a45c9e1b711dbac6fb, Handshake 2025/04/30 11:04:12 client Long Header{Type: Handshake, DestConnectionID: ab90a3c0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 client Short Header{DestConnectionID: ab90a3c0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 client -> Sending packet 2 (29 bytes) for connection a45c9e1b711dbac6fb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: ab90a3c0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 715.984µs} 2025/04/30 11:04:12 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 352µs} 2025/04/30 11:04:12 client Peer doesn't await address validation any longer. 2025/04/30 11:04:12 client newly acked packets (2): [0 1] 2025/04/30 11:04:12 client updated RTT: 33.274ms (σ: 12.816ms) 2025/04/30 11:04:12 client Canceling loss detection timer. 2025/04/30 11:04:12 client Dropping Handshake keys. 2025/04/30 11:04:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 client <- &wire.NewTokenFrame{Token: 0x5414b9843254c4a8177ad8eaec2bbd7f53635dc0c34c8aaba0f27fae82333b49257437a3febe08cde97ba311afd4dc6a67fc796b99139cc1187d996b19acc2a5da2a2e806b8c3e3a34bd33c632f030f33c6581d6f078} 2025/04/30 11:04:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:12 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:12 client -> Sending packet 3 (31 bytes) for connection a45c9e1b711dbac6fb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: ab90a3c0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 74.849µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:12 client -> Sending packet 4 (26 bytes) for connection a45c9e1b711dbac6fb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 client Short Header{DestConnectionID: ab90a3c0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:12 client Connection a45c9e1b711dbac6fb closed. 2025/04/30 11:04:12 Requesting https://server4:443/evklzdtmjy. 2025/04/30 11:04:12 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:12 Increased send buffer size to 14336 kiB 2025/04/30 11:04:12 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:12 Created qlog file: /logs/qlog/cc126c14fa7a4ef739138f61e528.sqlog 2025/04/30 11:04:12 client Starting new connection to server4 ([::]:34721 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cc126c14fa7a4ef739138f61e528, version v1 2025/04/30 11:04:12 Adding connection ID (empty). 2025/04/30 11:04:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:12 client -> Sending packet 0 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:12 client Long Header{Type: Initial, DestConnectionID: cc126c14fa7a4ef739138f61e528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:13 client -> Sending packet 1 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: cc126c14fa7a4ef739138f61e528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:13 client -> Sending packet 2 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: cc126c14fa7a4ef739138f61e528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:13 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8882db49, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 client Received first packet. Switching destination connection ID to: 8882db49 2025/04/30 11:04:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 client newly acked packets (1): [2] 2025/04/30 11:04:13 client updated RTT: 33.928041ms (σ: 16.96402ms) 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client -> Sending packet 3 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: 8882db49, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:13 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8882db49, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 client -> Sending packet 4 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: 8882db49, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:13 client <- Reading packet 2 (744 bytes) for connection (empty), Handshake 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8882db49, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cc126c14fa7a4ef739138f61e528, InitialSourceConnectionID: 8882db49, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x416cd97b61a6bee9fe33d5deac846b73} 2025/04/30 11:04:13 client -> Sending packet 0 (75 bytes) for connection cc126c14fa7a4ef739138f61e528, Handshake 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: 8882db49, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:13 client Dropping Initial keys. 2025/04/30 11:04:13 client -> Sending packet 0 (42 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 8882db49, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:13 client <- Reading packet 2 (331 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 client Peer doesn't await address validation any longer. 2025/04/30 11:04:13 client newly acked packets (1): [0] 2025/04/30 11:04:13 client updated RTT: 33.619ms (σ: 13.339ms) 2025/04/30 11:04:13 client ECN capability confirmed. 2025/04/30 11:04:13 client Canceling loss detection timer. 2025/04/30 11:04:13 client Dropping Handshake keys. 2025/04/30 11:04:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 client <- &wire.NewTokenFrame{Token: 0x765472f547a4783ae3bcea330e01d8c99da7eb10b6a18dac14d1ee3b6dbe661b9875e66c6ba160a5c28c51753b3a7577580af7f112e9adfe29af2306e4fc1a78b7dd469a70864865cba8ad9901a8bd184441f4ba879c} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79187732, StatelessResetToken: 0xa2025852888171b26d143bc95c5f8868} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f2135b3, StatelessResetToken: 0xa6de1e5860ca5c1913ad5bd9c9a76bc8} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b5193b5, StatelessResetToken: 0x6a6d1c57b7a75d293662def6610961f7} 2025/04/30 11:04:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:13 client -> Sending packet 1 (33 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 79187732, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 233.275µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:13 client <- Reading packet 3 (323 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79187732, StatelessResetToken: 0xa2025852888171b26d143bc95c5f8868} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f2135b3, StatelessResetToken: 0xa6de1e5860ca5c1913ad5bd9c9a76bc8} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b5193b5, StatelessResetToken: 0x6a6d1c57b7a75d293662def6610961f7} 2025/04/30 11:04:13 client <- &wire.NewTokenFrame{Token: 0x765472f547a4783ae3bcea330e01d8c99da7eb10b6a18dac14d1ee3b6dbe661b9875e66c6ba160a5c28c51753b3a7577580af7f112e9adfe29af2306e4fc1a78b7dd469a70864865cba8ad9901a8bd184441f4ba879c} 2025/04/30 11:04:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:13 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:13 client -> Sending packet 2 (31 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 79187732, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 60.423µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:13 client -> Sending packet 3 (26 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 79187732, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:13 client Connection cc126c14fa7a4ef739138f61e528 closed. 2025/04/30 11:04:13 Requesting https://server4:443/kvdepdsywc. 2025/04/30 11:04:13 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:13 Increased send buffer size to 14336 kiB 2025/04/30 11:04:13 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:13 Created qlog file: /logs/qlog/b7f67d03d16255592f876308ff7c.sqlog 2025/04/30 11:04:13 client Starting new connection to server4 ([::]:45573 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b7f67d03d16255592f876308ff7c, version v1 2025/04/30 11:04:13 Adding connection ID (empty). 2025/04/30 11:04:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:13 client -> Sending packet 0 (1280 bytes) for connection b7f67d03d16255592f876308ff7c, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: b7f67d03d16255592f876308ff7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:13 client Parsed a coalesced packet. Part 1: 448 bytes. Remaining: 832 bytes. 2025/04/30 11:04:13 client <- Reading packet 0 (448 bytes) for connection (empty), Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4409da52, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:04:13 client Received first packet. Switching destination connection ID to: 4409da52 2025/04/30 11:04:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 client newly acked packets (1): [0] 2025/04/30 11:04:13 client updated RTT: 33.373023ms (σ: 16.686511ms) 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Parsed a coalesced packet. Part 2: 741 bytes. Remaining: 91 bytes. 2025/04/30 11:04:13 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4409da52, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:04:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b7f67d03d16255592f876308ff7c, InitialSourceConnectionID: 4409da52, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xba4744c5ffcc5eddb5d190cff17901ae} 2025/04/30 11:04:13 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be9f7ffb, StatelessResetToken: 0x8b4928bdc57a4581ac56f81d71e1aeeb} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eb7d1b84, StatelessResetToken: 0x6329b3aacc9bf58247d4d879b91a9c3e} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 57af0829, StatelessResetToken: 0x19827c91a25b965ae06574bf62addacd} 2025/04/30 11:04:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b7f67d03d16255592f876308ff7c 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: eb7d1b84, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: eb7d1b84, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:13 client Short Header{DestConnectionID: eb7d1b84, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:13 client Dropping Initial keys. 2025/04/30 11:04:13 client -> Sending packet 1 (78 bytes) for connection b7f67d03d16255592f876308ff7c, Handshake 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: eb7d1b84, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 client Short Header{DestConnectionID: eb7d1b84, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:13 client -> Sending packet 2 (29 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: eb7d1b84, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 764.215µs} 2025/04/30 11:04:13 client <- Reading packet 1 (256 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 11:04:13 client Peer doesn't await address validation any longer. 2025/04/30 11:04:13 client newly acked packets (2): [0 1] 2025/04/30 11:04:13 client updated RTT: 33.277ms (σ: 12.704ms) 2025/04/30 11:04:13 client Canceling loss detection timer. 2025/04/30 11:04:13 client Dropping Handshake keys. 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 client <- &wire.NewTokenFrame{Token: 0x60d091aaccf57195ad62446405c16b973d7b3869e95c5a891ce70502f52270b6725e17849dd2244b3158f25092f4f58c22eaaae7412ad8fb18d992ab19ad6c5af9bdea5a282359d18e0e8a038fbc536cfb8447e7f025} 2025/04/30 11:04:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:13 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:13 client -> Sending packet 3 (32 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: eb7d1b84, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.345628ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:13 client -> Sending packet 4 (33 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: eb7d1b84, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 119.452µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:13 client -> Sending packet 5 (26 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: eb7d1b84, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:13 client Connection b7f67d03d16255592f876308ff7c closed. 2025/04/30 11:04:13 Requesting https://server4:443/gywquaxfds. 2025/04/30 11:04:13 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:13 Increased send buffer size to 14336 kiB 2025/04/30 11:04:13 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:13 Created qlog file: /logs/qlog/954b73e08f6172fc0f009b94cd.sqlog 2025/04/30 11:04:13 client Starting new connection to server4 ([::]:59183 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 954b73e08f6172fc0f009b94cd, version v1 2025/04/30 11:04:13 Adding connection ID (empty). 2025/04/30 11:04:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 11:04:13 client -> Sending packet 0 (1280 bytes) for connection 954b73e08f6172fc0f009b94cd, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: 954b73e08f6172fc0f009b94cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:13 client -> Sending packet 1 (1280 bytes) for connection 954b73e08f6172fc0f009b94cd, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: 954b73e08f6172fc0f009b94cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:13 client -> Sending packet 2 (1280 bytes) for connection 954b73e08f6172fc0f009b94cd, Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: 954b73e08f6172fc0f009b94cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:13 client Parsed a coalesced packet. Part 1: 450 bytes. Remaining: 830 bytes. 2025/04/30 11:04:13 client <- Reading packet 0 (450 bytes) for connection (empty), Initial 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4e6194c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:13 client Received first packet. Switching destination connection ID to: f4e6194c 2025/04/30 11:04:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Parsed a coalesced packet. Part 2: 739 bytes. Remaining: 91 bytes. 2025/04/30 11:04:13 client <- Reading packet 0 (739 bytes) for connection (empty), Handshake 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f4e6194c, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 954b73e08f6172fc0f009b94cd, InitialSourceConnectionID: f4e6194c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x515b4fb1486c992c6bc3e5be70847e27} 2025/04/30 11:04:13 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b39a305, StatelessResetToken: 0xc666183657ef1f68f3b628729e0c92f3} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12582679, StatelessResetToken: 0xfb67a35775141384d659116a60284261} 2025/04/30 11:04:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 90ece074, StatelessResetToken: 0x5631650be3d99fafdc1e029a7e1cc70d} 2025/04/30 11:04:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 954b73e08f6172fc0f009b94cd 2025/04/30 11:04:13 client Long Header{Type: Initial, DestConnectionID: 12582679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: 12582679, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:13 client Short Header{DestConnectionID: 12582679, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:13 client Dropping Initial keys. 2025/04/30 11:04:13 client -> Sending packet 1 (78 bytes) for connection 954b73e08f6172fc0f009b94cd, Handshake 2025/04/30 11:04:13 client Long Header{Type: Handshake, DestConnectionID: 12582679, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 client Short Header{DestConnectionID: 12582679, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:13 client -> Sending packet 2 (29 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 12582679, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 686.941µs} 2025/04/30 11:04:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:13 client <- Reading packet 3 (251 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 client Dropping Handshake keys. 2025/04/30 11:04:13 client <- &wire.NewTokenFrame{Token: 0xffae760639348ea1383713a2c33f4e08f68d4b4ab51c4194cb863dae8bf13ca5b4ebede458e127e2ae429d709a324672184a94ff19dd4793d93e7c44076214e7d860de5331550d09ecff35eaecadf81ddfdfcbac3bd1} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:13 client -> Sending packet 3 (1366 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 12582679, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.PingFrame{} 2025/04/30 11:04:13 client -> Sending packet 4 (33 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 12582679, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 184.083µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 client <- Reading packet 4 (251 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 client <- &wire.NewTokenFrame{Token: 0xffae760639348ea1383713a2c33f4e08f68d4b4ab51c4194cb863dae8bf13ca5b4ebede458e127e2ae429d709a324672184a94ff19dd4793d93e7c44076214e7d860de5331550d09ecff35eaecadf81ddfdfcbac3bd1} 2025/04/30 11:04:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:13 client Sending ACK because the ACK timer expired. 2025/04/30 11:04:13 client -> Sending packet 5 (34 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 client Short Header{DestConnectionID: 12582679, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.252861ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 11:04:14 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:14 client -> Sending packet 7 (25 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 client Short Header{DestConnectionID: 12582679, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:14 client Skipping packet number 6 2025/04/30 11:04:14 client -> Sending packet 8 (42 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 client Short Header{DestConnectionID: 12582679, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:14 client <- Reading packet 6 (1366 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:14 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client <- &wire.PingFrame{} 2025/04/30 11:04:14 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:14 client <- Reading packet 7 (31 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:14 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 160µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:04:14 client newly acked packets (3): [3 7 8] 2025/04/30 11:04:14 client updated RTT: 32.236212ms (σ: 16.118106ms) 2025/04/30 11:04:14 client ECN capability confirmed. 2025/04/30 11:04:14 client Canceling loss detection timer. 2025/04/30 11:04:14 client -> Sending packet 9 (1409 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 client Short Header{DestConnectionID: 12582679, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client -> &wire.PingFrame{} 2025/04/30 11:04:14 client -> Sending packet 10 (35 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 client Short Header{DestConnectionID: 12582679, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 196.467µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:14 client <- Reading packet 9 (32 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:14 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 7}, {Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.352ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:04:14 client newly acked packets (1): [9] 2025/04/30 11:04:14 client <- Reading packet 12 (1045 bytes) for connection (empty), 1-RTT 2025/04/30 11:04:14 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:14 client Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:14 client -> Sending packet 11 (39 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 client Short Header{DestConnectionID: 12582679, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 106.418µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:04:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 11:04:14 client -> Sending packet 12 (26 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 client Short Header{DestConnectionID: 12582679, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 11:04:14 client Connection 954b73e08f6172fc0f009b94cd closed.