2025/09/12 08:46:04 Requesting https://server4:443/czabvjqhhq. 2025/09/12 08:46:04 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:04 Increased send buffer size to 14336 kiB 2025/09/12 08:46:04 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:04 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:04 Created qlog file: /logs/qlog/5bfd8970f844e24eabef8cbd.sqlog 2025/09/12 08:46:04 client Starting new connection to server4 ([::]:51963 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5bfd8970f844e24eabef8cbd, version v1 2025/09/12 08:46:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:04 client -> Sending packet 0 (1280 bytes) for connection 5bfd8970f844e24eabef8cbd, Initial 2025/09/12 08:46:04 client Long Header{Type: Initial, DestConnectionID: 5bfd8970f844e24eabef8cbd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:04 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 08:46:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:04 client -> Sending packet 1 (1280 bytes) for connection 5bfd8970f844e24eabef8cbd, Initial 2025/09/12 08:46:04 client Long Header{Type: Initial, DestConnectionID: 5bfd8970f844e24eabef8cbd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:04 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:04 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 08:46:04 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bbb36aaa, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:04 client Received first packet. Switching destination connection ID to: bbb36aaa 2025/09/12 08:46:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:04 client newly acked packets (1): [0] 2025/09/12 08:46:04 client updated RTT: 37.246096ms (σ: 18.623048ms) 2025/09/12 08:46:04 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bbb36aaa, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:04 client newly acked packets (1): [1] 2025/09/12 08:46:04 client updated RTT: 37.444ms (σ: 14.363ms) 2025/09/12 08:46:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:04 client -> Sending packet 2 (1280 bytes) for connection 5bfd8970f844e24eabef8cbd, Initial 2025/09/12 08:46:04 client Long Header{Type: Initial, DestConnectionID: bbb36aaa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:04 client Parsed a coalesced packet. Part 1: 741 bytes. Remaining: 91 bytes. 2025/09/12 08:46:04 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/09/12 08:46:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bbb36aaa, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/09/12 08:46:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 08:46:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5bfd8970f844e24eabef8cbd, InitialSourceConnectionID: bbb36aaa, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xbf3d727d04ad8a62456f403c8cc6184d, EnableResetStreamAt: false} 2025/09/12 08:46:04 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8d55a4, StatelessResetToken: 0x0ed6bb248b590131aac991044712575c} 2025/09/12 08:46:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 584318fc, StatelessResetToken: 0x501d8f0995d90ff7967efc0d308ea2b7} 2025/09/12 08:46:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca3f45da, StatelessResetToken: 0xf630c543e1b2eebad57f536ffdb9392b} 2025/09/12 08:46:04 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:04 client -> Sending packet 0 (100 bytes) for connection 5bfd8970f844e24eabef8cbd, Handshake 2025/09/12 08:46:04 client Long Header{Type: Handshake, DestConnectionID: 584318fc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:04 client Short Header{DestConnectionID: 584318fc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:04 client Dropping Initial keys. 2025/09/12 08:46:04 client -> Sending packet 1 (48 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:04 client Short Header{DestConnectionID: 584318fc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 522.571µs} 2025/09/12 08:46:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:05 client -> Sending packet 1 (70 bytes) for connection 5bfd8970f844e24eabef8cbd, Handshake 2025/09/12 08:46:05 client Long Header{Type: Handshake, DestConnectionID: 584318fc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:05 client -> Sending packet 2 (70 bytes) for connection 5bfd8970f844e24eabef8cbd, Handshake 2025/09/12 08:46:05 client Long Header{Type: Handshake, DestConnectionID: 584318fc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:05 client <- Reading packet 3 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8d55a4, StatelessResetToken: 0x0ed6bb248b590131aac991044712575c} 2025/09/12 08:46:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 584318fc, StatelessResetToken: 0x501d8f0995d90ff7967efc0d308ea2b7} 2025/09/12 08:46:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca3f45da, StatelessResetToken: 0xf630c543e1b2eebad57f536ffdb9392b} 2025/09/12 08:46:05 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:05 client -> Sending packet 2 (33 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 100.908µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client <- Reading packet 4 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:05 client Dropping Handshake keys. 2025/09/12 08:46:05 client <- &wire.NewTokenFrame{Token: 0x2bdeb3bb7b425a00fddf56e76e8759e02937c82517a6b97833b194bdec11d0cd0c758e740358547f0cdcd70d2d8c387125df1bb0e8f3a4e03a2acf90a01515d0440c9763f43a1c746678ff88428c191f2e4c8080dbcf1b7cc12d30} 2025/09/12 08:46:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:05 client -> Sending packet 4 (35 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 140.471µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:05 client Skipping packet number 3 2025/09/12 08:46:05 client -> Sending packet 5 (42 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:05 client <- Reading packet 5 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 128µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client newly acked packets (1): [4] 2025/09/12 08:46:05 client updated RTT: 36.62ms (σ: 12.418ms) 2025/09/12 08:46:05 client ECN capability confirmed. 2025/09/12 08:46:05 client Ignoring all packets below 5. 2025/09/12 08:46:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:05 client -> Sending packet 7 (42 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:05 client -> Sending packet 8 (42 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:05 client <- Reading packet 7 (31 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client newly acked packets (1): [8] 2025/09/12 08:46:05 client updated RTT: 35.909ms (σ: 10.733ms) 2025/09/12 08:46:05 client Canceling loss detection timer. 2025/09/12 08:46:05 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:05 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:05 client -> Sending packet 9 (33 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 57.947µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:05 client -> Sending packet 10 (26 bytes) for connection 5bfd8970f844e24eabef8cbd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 584318fc, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:05 client Connection 5bfd8970f844e24eabef8cbd closed. 2025/09/12 08:46:05 Requesting https://server4:443/dxnfvoesyl. 2025/09/12 08:46:05 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:05 Increased send buffer size to 14336 kiB 2025/09/12 08:46:05 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:05 Created qlog file: /logs/qlog/8ef196652b413f0628.sqlog 2025/09/12 08:46:05 client Starting new connection to server4 ([::]:56254 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8ef196652b413f0628, version v1 2025/09/12 08:46:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:05 client -> Sending packet 0 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 8ef196652b413f0628, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:05 client -> Sending packet 1 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 8ef196652b413f0628, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 08:46:05 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 552bffee, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:05 client Received first packet. Switching destination connection ID to: 552bffee 2025/09/12 08:46:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:05 client newly acked packets (1): [0] 2025/09/12 08:46:05 client updated RTT: 31.887048ms (σ: 15.943524ms) 2025/09/12 08:46:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:05 client -> Sending packet 2 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 552bffee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 client -> Sending packet 3 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 552bffee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 08:46:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:05 client -> Sending packet 4 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 552bffee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 client -> Sending packet 5 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 552bffee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 552bffee, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:05 client -> Sending packet 6 (1280 bytes) for connection 8ef196652b413f0628, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: 552bffee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:05 client Parsed a coalesced packet. Part 1: 746 bytes. Remaining: 91 bytes. 2025/09/12 08:46:05 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 552bffee, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8ef196652b413f0628, InitialSourceConnectionID: 552bffee, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x4303d7d48e57240b2254456135b36713, EnableResetStreamAt: false} 2025/09/12 08:46:05 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05a0ee7c, StatelessResetToken: 0xc48ad03d72d0c38385403e409e72467c} 2025/09/12 08:46:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b769e32f, StatelessResetToken: 0xe5f77ea729bd19e5765b44c17d05e9eb} 2025/09/12 08:46:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 30fdcf7c, StatelessResetToken: 0x874ff27906b2642c6cbd77dd30646f8e} 2025/09/12 08:46:05 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:05 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 552bffee, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:05 client newly acked packets (1): [5] 2025/09/12 08:46:05 client updated RTT: 32.176ms (σ: 12.535ms) 2025/09/12 08:46:05 client -> Sending packet 0 (119 bytes) for connection 8ef196652b413f0628, Handshake 2025/09/12 08:46:05 client Long Header{Type: Handshake, DestConnectionID: 05a0ee7c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:05 client Short Header{DestConnectionID: 05a0ee7c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:05 client Dropping Initial keys. 2025/09/12 08:46:05 client -> Sending packet 1 (29 bytes) for connection 8ef196652b413f0628, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 05a0ee7c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 580.367µs} 2025/09/12 08:46:05 client <- Reading packet 1 (293 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/09/12 08:46:05 client Peer doesn't await address validation any longer. 2025/09/12 08:46:05 client newly acked packets (1): [0] 2025/09/12 08:46:05 client updated RTT: 32.081ms (σ: 9.589ms) 2025/09/12 08:46:05 client Canceling loss detection timer. 2025/09/12 08:46:05 client Dropping Handshake keys. 2025/09/12 08:46:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:05 client <- &wire.NewTokenFrame{Token: 0x52a9dfbe59a0d714655299325ceed4cac13d890b8445938d051dc101eb79c398171ac541d860c938af76f537748a715b24cac548e9684066ab8d529f0a09e62c28fe05a1305977ac29593b1d88a35f02905c7728598440f9b609df} 2025/09/12 08:46:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:05 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:05 client -> Sending packet 2 (32 bytes) for connection 8ef196652b413f0628, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 05a0ee7c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.343381ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client <- Reading packet 4 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:05 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:05 client <- &wire.NewTokenFrame{Token: 0x52a9dfbe59a0d714655299325ceed4cac13d890b8445938d051dc101eb79c398171ac541d860c938af76f537748a715b24cac548e9684066ab8d529f0a09e62c28fe05a1305977ac29593b1d88a35f02905c7728598440f9b609df} 2025/09/12 08:46:05 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:05 client -> Sending packet 3 (33 bytes) for connection 8ef196652b413f0628, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 05a0ee7c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 80.921µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:05 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:05 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:05 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:05 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:05 client -> Sending packet 4 (26 bytes) for connection 8ef196652b413f0628, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:05 client Short Header{DestConnectionID: 05a0ee7c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:05 client Connection 8ef196652b413f0628 closed. 2025/09/12 08:46:05 Requesting https://server4:443/opgsfneoev. 2025/09/12 08:46:05 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:05 Increased send buffer size to 14336 kiB 2025/09/12 08:46:05 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:05 Created qlog file: /logs/qlog/d1350a6b9c70d05b2faf21f8349cacdb.sqlog 2025/09/12 08:46:05 client Starting new connection to server4 ([::]:39935 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d1350a6b9c70d05b2faf21f8349cacdb, version v1 2025/09/12 08:46:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:05 client -> Sending packet 0 (1280 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: d1350a6b9c70d05b2faf21f8349cacdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 08:46:05 client -> Sending packet 1 (1280 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: d1350a6b9c70d05b2faf21f8349cacdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 08:46:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:05 client -> Sending packet 2 (1280 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: d1350a6b9c70d05b2faf21f8349cacdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 08:46:05 client -> Sending packet 3 (1280 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Initial 2025/09/12 08:46:05 client Long Header{Type: Initial, DestConnectionID: d1350a6b9c70d05b2faf21f8349cacdb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 08:46:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:05 client Parsed a coalesced packet. Part 1: 744 bytes. Remaining: 91 bytes. 2025/09/12 08:46:05 client Queueing packet (744 bytes) for later decryption 2025/09/12 08:46:05 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:06 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba76af6c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client Received first packet. Switching destination connection ID to: ba76af6c 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client -> Sending packet 4 (1280 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: ba76af6c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/09/12 08:46:06 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba76af6c, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 08:46:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d1350a6b9c70d05b2faf21f8349cacdb, InitialSourceConnectionID: ba76af6c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x73d8ed13dceeb3dde5ca8b4465bcce1b, EnableResetStreamAt: false} 2025/09/12 08:46:06 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 713439a4, StatelessResetToken: 0x42a0ce1b2e990109e7e57c6277e437e9} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 79765866, StatelessResetToken: 0x1e980fb96cff3e883ad703001684b799} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e3937513, StatelessResetToken: 0x14b5869a682b4fcbc572ceddcb1fe448} 2025/09/12 08:46:06 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:06 client -> Sending packet 0 (100 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 713439a4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client Short Header{DestConnectionID: 713439a4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:06 client Dropping Initial keys. 2025/09/12 08:46:06 client -> Sending packet 1 (50 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 713439a4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 202.208911ms} 2025/09/12 08:46:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:06 client <- Reading packet 1 (744 bytes) for connection (empty), Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba76af6c, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 08:46:06 client -> Sending packet 1 (36 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 713439a4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client <- Reading packet 3 (744 bytes) for connection (empty), Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba76af6c, PacketNumber: 3, PacketNumberLen: 2, Length: 731, Version: v1} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 08:46:06 client -> Sending packet 2 (38 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 713439a4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:06 client -> Sending packet 3 (70 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 713439a4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client -> Sending packet 4 (70 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 713439a4, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client <- Reading packet 4 (30 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 199.704ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:06 client Peer doesn't await address validation any longer. 2025/09/12 08:46:06 client newly acked packets (1): [1] 2025/09/12 08:46:06 client updated RTT: 231.59291ms (σ: 115.796455ms) 2025/09/12 08:46:06 client ECN capability confirmed. 2025/09/12 08:46:06 client setting loss timer for packet 0 (1-RTT) to 260.542023ms (in 2025-09-12 08:46:06.355731028 +0000 UTC m=+1.491019818) 2025/09/12 08:46:06 client Dropping Handshake keys. 2025/09/12 08:46:06 client Ignoring all packets below 1. 2025/09/12 08:46:06 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:06 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:06 client -> Sending packet 2 (31 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 713439a4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 70.351µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:06 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:06 client -> Sending packet 3 (26 bytes) for connection d1350a6b9c70d05b2faf21f8349cacdb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 713439a4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:06 client Connection d1350a6b9c70d05b2faf21f8349cacdb closed. 2025/09/12 08:46:06 Requesting https://server4:443/aujqxufyds. 2025/09/12 08:46:06 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:06 Increased send buffer size to 14336 kiB 2025/09/12 08:46:06 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:06 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:06 Created qlog file: /logs/qlog/f025064212de79ebbdfb4edd.sqlog 2025/09/12 08:46:06 client Starting new connection to server4 ([::]:41613 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f025064212de79ebbdfb4edd, version v1 2025/09/12 08:46:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:06 client -> Sending packet 0 (1280 bytes) for connection f025064212de79ebbdfb4edd, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: f025064212de79ebbdfb4edd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 08:46:06 client -> Sending packet 1 (1280 bytes) for connection f025064212de79ebbdfb4edd, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: f025064212de79ebbdfb4edd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 1236, Data length: 277, Offset + Data length: 1513} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:06 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 940cf9fc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:06 client Received first packet. Switching destination connection ID to: 940cf9fc 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client newly acked packets (1): [0] 2025/09/12 08:46:06 client updated RTT: 31.904373ms (σ: 15.952186ms) 2025/09/12 08:46:06 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 940cf9fc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client newly acked packets (1): [1] 2025/09/12 08:46:06 client updated RTT: 32.244ms (σ: 12.644ms) 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client -> Sending packet 2 (1280 bytes) for connection f025064212de79ebbdfb4edd, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: 940cf9fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client Parsed a coalesced packet. Part 1: 753 bytes. Remaining: 91 bytes. 2025/09/12 08:46:06 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 940cf9fc, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f025064212de79ebbdfb4edd, InitialSourceConnectionID: 940cf9fc, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x0c9dad87e2446424da42836913367bcb, EnableResetStreamAt: false} 2025/09/12 08:46:06 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d12cead2, StatelessResetToken: 0xe10bf033183f9c5201e573c48666c1d7} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c0f5b65b, StatelessResetToken: 0xa9f94df717cac43a56f007f773e8bf9c} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 94a71f63, StatelessResetToken: 0xa315a9efebe0622f79cf90b9dcc19a2a} 2025/09/12 08:46:06 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:06 client -> Sending packet 0 (100 bytes) for connection f025064212de79ebbdfb4edd, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: c0f5b65b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client Short Header{DestConnectionID: c0f5b65b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:06 client Dropping Initial keys. 2025/09/12 08:46:06 client -> Sending packet 1 (47 bytes) for connection f025064212de79ebbdfb4edd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: c0f5b65b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464.363µs} 2025/09/12 08:46:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:06 client -> Sending packet 1 (70 bytes) for connection f025064212de79ebbdfb4edd, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: c0f5b65b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client -> Sending packet 2 (70 bytes) for connection f025064212de79ebbdfb4edd, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: c0f5b65b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client <- Reading packet 2 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 940cf9fc, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:06 client -> Sending packet 3 (38 bytes) for connection f025064212de79ebbdfb4edd, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: c0f5b65b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:06 client <- Reading packet 2 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.304ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:06 client Peer doesn't await address validation any longer. 2025/09/12 08:46:06 client newly acked packets (1): [1] 2025/09/12 08:46:06 client updated RTT: 39.28ms (σ: 23.555ms) 2025/09/12 08:46:06 client ECN capability confirmed. 2025/09/12 08:46:06 client lost packet 0 (time threshold) 2025/09/12 08:46:06 client Canceling loss detection timer. 2025/09/12 08:46:06 client Dropping Handshake keys. 2025/09/12 08:46:06 client Ignoring all packets below 1. 2025/09/12 08:46:06 client -> Sending packet 2 (25 bytes) for connection f025064212de79ebbdfb4edd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: c0f5b65b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:06 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.304ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:06 client newly acked packets (1): [2] 2025/09/12 08:46:06 client updated RTT: 41.373ms (σ: 21.852ms) 2025/09/12 08:46:06 client Canceling loss detection timer. 2025/09/12 08:46:06 client <- Reading packet 6 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:06 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:06 client <- &wire.NewTokenFrame{Token: 0x2f82c91d3de5a0658e57d0e227e6740723b849ab2c8a5b14bc5bdf284317579f6e8ffbe3bbfca8e8f4e99ba8c14a9513ab98ad3e8d411daa0ab088df01f5e7d98814bc1f1de6278b91e0a457d3b5f619e8fa39bf511015d221cc5d} 2025/09/12 08:46:06 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:06 client -> Sending packet 3 (35 bytes) for connection f025064212de79ebbdfb4edd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: c0f5b65b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 113.051µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:06 client <- Reading packet 7 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:06 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:06 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:06 client -> Sending packet 4 (26 bytes) for connection f025064212de79ebbdfb4edd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: c0f5b65b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:06 client Connection f025064212de79ebbdfb4edd closed. 2025/09/12 08:46:06 Requesting https://server4:443/emcitemrgh. 2025/09/12 08:46:06 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:06 Increased send buffer size to 14336 kiB 2025/09/12 08:46:06 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:06 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:06 Created qlog file: /logs/qlog/e8bc7ceaa386163e911893297944eb467f.sqlog 2025/09/12 08:46:06 client Starting new connection to server4 ([::]:36997 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e8bc7ceaa386163e911893297944eb467f, version v1 2025/09/12 08:46:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:06 client -> Sending packet 0 (1280 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: e8bc7ceaa386163e911893297944eb467f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:06 client -> Sending packet 1 (1280 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: e8bc7ceaa386163e911893297944eb467f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 08:46:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:06 client -> Sending packet 2 (1280 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: e8bc7ceaa386163e911893297944eb467f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 08:46:06 client -> Sending packet 3 (1280 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: e8bc7ceaa386163e911893297944eb467f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 1231, Data length: 286, Offset + Data length: 1517} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:06 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fdc7a153, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:06 client Received first packet. Switching destination connection ID to: fdc7a153 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:06 client newly acked packets (1): [2] 2025/09/12 08:46:06 client updated RTT: 32.285745ms (σ: 16.142872ms) 2025/09/12 08:46:06 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fdc7a153, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:06 client newly acked packets (1): [3] 2025/09/12 08:46:06 client updated RTT: 32.564ms (σ: 12.664ms) 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client -> Sending packet 4 (1280 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: fdc7a153, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client Parsed a coalesced packet. Part 1: 754 bytes. Remaining: 91 bytes. 2025/09/12 08:46:06 client <- Reading packet 0 (754 bytes) for connection (empty), Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fdc7a153, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 08:46:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e8bc7ceaa386163e911893297944eb467f, InitialSourceConnectionID: fdc7a153, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xb0c0a6b2cb5d7d3f9775a0253bc98ede, EnableResetStreamAt: false} 2025/09/12 08:46:06 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cdeaa54b, StatelessResetToken: 0xbc77be309b6fbff14f65e0eed5321f4e} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0d586786, StatelessResetToken: 0x79644f565747a8af1a9008bda0564800} 2025/09/12 08:46:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6d91beb2, StatelessResetToken: 0x87aaff68608162e04fd1f52bfa33915a} 2025/09/12 08:46:06 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:06 client -> Sending packet 0 (100 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 6d91beb2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client Short Header{DestConnectionID: 6d91beb2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:06 client Dropping Initial keys. 2025/09/12 08:46:06 client -> Sending packet 1 (47 bytes) for connection e8bc7ceaa386163e911893297944eb467f, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 6d91beb2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 482.309µs} 2025/09/12 08:46:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:06 client -> Sending packet 1 (70 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 6d91beb2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client -> Sending packet 2 (70 bytes) for connection e8bc7ceaa386163e911893297944eb467f, Handshake 2025/09/12 08:46:06 client Long Header{Type: Handshake, DestConnectionID: 6d91beb2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:06 client <- Reading packet 4 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:06 client Dropping Handshake keys. 2025/09/12 08:46:06 client <- &wire.NewTokenFrame{Token: 0x7ccbd52c6de1033d8445f5de019d059ac679d4d248152cfc7ef3e2ced3bf5276b763de66e64cb1a7d72cb3e1684fbf7137eea3dd656b4bcfb342cdb1cabbb91b620a9094721a446a6ea3f4f0aaf155c651a191ce74f4732102f245} 2025/09/12 08:46:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:06 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:06 client -> Sending packet 3 (35 bytes) for connection e8bc7ceaa386163e911893297944eb467f, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 6d91beb2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 165.177µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:06 client Skipping packet number 2 2025/09/12 08:46:06 client -> Sending packet 4 (42 bytes) for connection e8bc7ceaa386163e911893297944eb467f, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 6d91beb2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:06 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:06 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:06 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:06 client -> Sending packet 5 (26 bytes) for connection e8bc7ceaa386163e911893297944eb467f, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:06 client Short Header{DestConnectionID: 6d91beb2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:06 client Connection e8bc7ceaa386163e911893297944eb467f closed. 2025/09/12 08:46:06 Requesting https://server4:443/gkkxmugpku. 2025/09/12 08:46:06 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:06 Increased send buffer size to 14336 kiB 2025/09/12 08:46:06 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:06 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:06 Created qlog file: /logs/qlog/23c0439c8d1169fcb81a6cfd91c77a74.sqlog 2025/09/12 08:46:06 client Starting new connection to server4 ([::]:50574 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 23c0439c8d1169fcb81a6cfd91c77a74, version v1 2025/09/12 08:46:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:06 client -> Sending packet 0 (1280 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: 23c0439c8d1169fcb81a6cfd91c77a74, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 08:46:06 client -> Sending packet 1 (1280 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: 23c0439c8d1169fcb81a6cfd91c77a74, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 08:46:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:06 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b3c314a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:06 client Received first packet. Switching destination connection ID to: 3b3c314a 2025/09/12 08:46:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:06 client newly acked packets (1): [1] 2025/09/12 08:46:06 client updated RTT: 32.939828ms (σ: 16.469914ms) 2025/09/12 08:46:06 client setting loss timer for packet 0 (Initial) to 37.057306ms (in 2025-09-12 08:46:06.995256691 +0000 UTC m=+2.130545491) 2025/09/12 08:46:06 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 08:46:06.995256691 +0000 UTC m=+2.130545491 2025/09/12 08:46:06 client lost packet 0 (time threshold) 2025/09/12 08:46:06 client -> Sending packet 2 (1280 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, Initial 2025/09/12 08:46:06 client Long Header{Type: Initial, DestConnectionID: 3b3c314a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 08:46:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:07 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b3c314a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [2] 2025/09/12 08:46:07 client updated RTT: 33ms (σ: 12.474ms) 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client -> Sending packet 3 (1280 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 3b3c314a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client Parsed a coalesced packet. Part 1: 755 bytes. Remaining: 91 bytes. 2025/09/12 08:46:07 client <- Reading packet 0 (755 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3b3c314a, PacketNumber: 0, PacketNumberLen: 2, Length: 742, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/09/12 08:46:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 23c0439c8d1169fcb81a6cfd91c77a74, InitialSourceConnectionID: 3b3c314a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x9b486a2ef9496bbd7a16d2d8c49caa41, EnableResetStreamAt: false} 2025/09/12 08:46:07 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 338cd389, StatelessResetToken: 0x9675c4f1276dc55e24fcd401ff52477b} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c021261f, StatelessResetToken: 0x811fc30536d6616eafb745ad38e76018} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: adba9a86, StatelessResetToken: 0xf88de2123db62c8d802c6ed21acd4995} 2025/09/12 08:46:07 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:07 client -> Sending packet 0 (100 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: 338cd389, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:07 client Short Header{DestConnectionID: 338cd389, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:07 client Dropping Initial keys. 2025/09/12 08:46:07 client -> Sending packet 1 (47 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 338cd389, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 442.753µs} 2025/09/12 08:46:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:07 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 312µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client Peer doesn't await address validation any longer. 2025/09/12 08:46:07 client newly acked packets (2): [0 1] 2025/09/12 08:46:07 client updated RTT: 32.83ms (σ: 9.695ms) 2025/09/12 08:46:07 client ECN capability confirmed. 2025/09/12 08:46:07 client Canceling loss detection timer. 2025/09/12 08:46:07 client Dropping Handshake keys. 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:07 client <- &wire.NewTokenFrame{Token: 0x082dec6333ff3ca5321a22d98f57986dd41e279353c26bfef18abda3fb708fb6f4893447b208937ea54b2f9fe17a8a9d355c42e7c010b8452dcb46449684eef11b6be89e8127252380217f2bfa5c3b4f724186406c8be5ddc3b2c9} 2025/09/12 08:46:07 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:07 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:07 client Ignoring all packets below 1. 2025/09/12 08:46:07 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:07 client -> Sending packet 2 (32 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 338cd389, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.339445ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:07 client -> Sending packet 3 (33 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 338cd389, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 109.914µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:07 client -> Sending packet 4 (26 bytes) for connection 23c0439c8d1169fcb81a6cfd91c77a74, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 338cd389, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:07 client Connection 23c0439c8d1169fcb81a6cfd91c77a74 closed. 2025/09/12 08:46:07 Requesting https://server4:443/rypyptlqgg. 2025/09/12 08:46:07 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:07 Increased send buffer size to 14336 kiB 2025/09/12 08:46:07 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:07 Created qlog file: /logs/qlog/8226cb4b623f5b204e37d45ddcafe6eb878d.sqlog 2025/09/12 08:46:07 client Starting new connection to server4 ([::]:47549 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8226cb4b623f5b204e37d45ddcafe6eb878d, version v1 2025/09/12 08:46:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:07 client -> Sending packet 0 (1280 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 8226cb4b623f5b204e37d45ddcafe6eb878d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:07 client -> Sending packet 1 (1280 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 8226cb4b623f5b204e37d45ddcafe6eb878d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 1230, Data length: 281, Offset + Data length: 1511} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:07 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63c5c231, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:07 client Received first packet. Switching destination connection ID to: 63c5c231 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [1] 2025/09/12 08:46:07 client updated RTT: 33.048769ms (σ: 16.524384ms) 2025/09/12 08:46:07 client setting loss timer for packet 0 (Initial) to 37.179865ms (in 2025-09-12 08:46:07.214358014 +0000 UTC m=+2.349646814) 2025/09/12 08:46:07 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 08:46:07.214358014 +0000 UTC m=+2.349646814 2025/09/12 08:46:07 client lost packet 0 (time threshold) 2025/09/12 08:46:07 client -> Sending packet 2 (1280 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 63c5c231, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:07 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63c5c231, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [2] 2025/09/12 08:46:07 client updated RTT: 33.109ms (σ: 12.515ms) 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client -> Sending packet 3 (1280 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 63c5c231, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client Parsed a coalesced packet. Part 1: 753 bytes. Remaining: 91 bytes. 2025/09/12 08:46:07 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63c5c231, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8226cb4b623f5b204e37d45ddcafe6eb878d, InitialSourceConnectionID: 63c5c231, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf075a6b7a6740824923b7e63ea190ef9, EnableResetStreamAt: false} 2025/09/12 08:46:07 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 86ce3b3d, StatelessResetToken: 0x385a35796ca0f8c76b92c99393e63815} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7bf9326d, StatelessResetToken: 0x8ef953b6df891427d96be67435dfe390} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e85cf4e4, StatelessResetToken: 0x54509fe16de2567eada785c31fddc550} 2025/09/12 08:46:07 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:07 client -> Sending packet 0 (100 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: e85cf4e4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:07 client Short Header{DestConnectionID: e85cf4e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:07 client Dropping Initial keys. 2025/09/12 08:46:07 client -> Sending packet 1 (47 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: e85cf4e4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 404.191µs} 2025/09/12 08:46:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:07 client -> Sending packet 1 (70 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: e85cf4e4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:07 client -> Sending packet 2 (70 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: e85cf4e4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:07 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63c5c231, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:07 client -> Sending packet 3 (36 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: e85cf4e4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client <- Reading packet 2 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63c5c231, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:07 client -> Sending packet 4 (36 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: e85cf4e4, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client <- Reading packet 1 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:07 client Dropping Handshake keys. 2025/09/12 08:46:07 client <- &wire.NewTokenFrame{Token: 0x0deb8a4a88c85597482f8dc8861cc88d21ecbee158d863aee39e84f01e0314099db39486cb07000c161ebb7ba83e73686c9ff0231517b307b7fa1bbc76b18e9b97d939b10d3310e7a15d069838d93be20ecd0a3b636ed969803ba2} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:07 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:07 client -> Sending packet 3 (33 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: e85cf4e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 85.679µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:07 client Skipping packet number 2 2025/09/12 08:46:07 client -> Sending packet 4 (42 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: e85cf4e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:07 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:07 client -> Sending packet 5 (33 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: e85cf4e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 90.639µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:07 client -> Sending packet 6 (26 bytes) for connection 8226cb4b623f5b204e37d45ddcafe6eb878d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: e85cf4e4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:07 client Connection 8226cb4b623f5b204e37d45ddcafe6eb878d closed. 2025/09/12 08:46:07 Requesting https://server4:443/hawsorkazm. 2025/09/12 08:46:07 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:07 Increased send buffer size to 14336 kiB 2025/09/12 08:46:07 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:07 Created qlog file: /logs/qlog/8a479aebd6b3f12af8ddfa5d4fcab4fa.sqlog 2025/09/12 08:46:07 client Starting new connection to server4 ([::]:60515 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8a479aebd6b3f12af8ddfa5d4fcab4fa, version v1 2025/09/12 08:46:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:07 client -> Sending packet 0 (1280 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 8a479aebd6b3f12af8ddfa5d4fcab4fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:07 client -> Sending packet 1 (1280 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 8a479aebd6b3f12af8ddfa5d4fcab4fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 1232, Data length: 273, Offset + Data length: 1505} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:07 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e81d850e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client Received first packet. Switching destination connection ID to: e81d850e 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (2): [0 1] 2025/09/12 08:46:07 client updated RTT: 34.184593ms (σ: 17.092296ms) 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client -> Sending packet 2 (1280 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: e81d850e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:07 client Parsed a coalesced packet. Part 1: 746 bytes. Remaining: 91 bytes. 2025/09/12 08:46:07 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e81d850e, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8a479aebd6b3f12af8ddfa5d4fcab4fa, InitialSourceConnectionID: e81d850e, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x4675231fff2d35210685e77267581eb8, EnableResetStreamAt: false} 2025/09/12 08:46:07 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58cda705, StatelessResetToken: 0xdce7e4ea5bcc858943b0eedf5f330d9e} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1fb02af4, StatelessResetToken: 0x853d1a012e8208da3a7073301dacefba} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cbcbfd8d, StatelessResetToken: 0x1f4660992361ebd6e8e33178b8b43fb4} 2025/09/12 08:46:07 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:07 client -> Sending packet 0 (100 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: 1fb02af4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:07 client Short Header{DestConnectionID: 1fb02af4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:07 client Dropping Initial keys. 2025/09/12 08:46:07 client -> Sending packet 1 (28 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 1fb02af4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 481.796µs} 2025/09/12 08:46:07 client -> Sending packet 2 (42 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 1fb02af4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:07 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:07 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:07 client -> Sending packet 3 (33 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 1fb02af4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 79.458µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:07 client -> Sending packet 1 (61 bytes) for connection 8a479aebd6b3f12af8ddfa5d4fcab4fa, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: 1fb02af4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 08:46:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:07 client Short Header{DestConnectionID: 1fb02af4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:07 client Connection 8a479aebd6b3f12af8ddfa5d4fcab4fa closed. 2025/09/12 08:46:07 Requesting https://server4:443/upwpbdgayg. 2025/09/12 08:46:07 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:07 Increased send buffer size to 14336 kiB 2025/09/12 08:46:07 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:07 Created qlog file: /logs/qlog/a85d34dee898363ee1ff.sqlog 2025/09/12 08:46:07 client Starting new connection to server4 ([::]:57344 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a85d34dee898363ee1ff, version v1 2025/09/12 08:46:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:07 client -> Sending packet 0 (1280 bytes) for connection a85d34dee898363ee1ff, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: a85d34dee898363ee1ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:07 client -> Sending packet 1 (1280 bytes) for connection a85d34dee898363ee1ff, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: a85d34dee898363ee1ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 1238, Data length: 280, Offset + Data length: 1518} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:07 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 32c9cac3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:07 client Received first packet. Switching destination connection ID to: 32c9cac3 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [0] 2025/09/12 08:46:07 client updated RTT: 31.909009ms (σ: 15.954504ms) 2025/09/12 08:46:07 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 32c9cac3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [1] 2025/09/12 08:46:07 client updated RTT: 32.201ms (σ: 12.55ms) 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client -> Sending packet 2 (1280 bytes) for connection a85d34dee898363ee1ff, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 32c9cac3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client -> Sending packet 3 (1280 bytes) for connection a85d34dee898363ee1ff, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 32c9cac3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.PingFrame{} 2025/09/12 08:46:07 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 32c9cac3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [3] 2025/09/12 08:46:07 client updated RTT: 32.168ms (σ: 9.476ms) 2025/09/12 08:46:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:07 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 32c9cac3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client -> Sending packet 4 (1280 bytes) for connection a85d34dee898363ee1ff, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 32c9cac3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 32c9cac3, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client -> Sending packet 5 (1280 bytes) for connection a85d34dee898363ee1ff, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 32c9cac3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client <- Reading packet 2 (744 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 32c9cac3, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 08:46:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a85d34dee898363ee1ff, InitialSourceConnectionID: 32c9cac3, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x50875dd8506fdaf1624dd179f278984e, EnableResetStreamAt: false} 2025/09/12 08:46:07 client -> Sending packet 0 (75 bytes) for connection a85d34dee898363ee1ff, Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: 32c9cac3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:07 client Dropping Initial keys. 2025/09/12 08:46:07 client -> Sending packet 0 (42 bytes) for connection a85d34dee898363ee1ff, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 32c9cac3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:07 client <- Reading packet 3 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:07 client Dropping Handshake keys. 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e866ab17, StatelessResetToken: 0x2aa23f58845052318937d635bc586c88} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:07 client <- &wire.NewTokenFrame{Token: 0x0fce10b84c1a99ce6dbbfae516904cd89c6d6dc1c3ceaa3eb24b919312ee242065136cc615c7d25f54c625d0afa062b0a97ea9286a35ce810afc477efb8b6531c7952c084dbc33e3eebbc45bf794ee5f1dd2ecd3e95c7998de896d} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2899918f, StatelessResetToken: 0xdd87b085b76d7efd14e5408f8c34a371} 2025/09/12 08:46:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4943a901, StatelessResetToken: 0x000f419fa6f712a4429cf79c7ae64ce7} 2025/09/12 08:46:07 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 918, Offset + Data length: 918} 2025/09/12 08:46:07 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:07 client -> Sending packet 1 (33 bytes) for connection a85d34dee898363ee1ff, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 2899918f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 125.573µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:07 client <- Reading packet 4 (129 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:07 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 918, Data length: 106, Offset + Data length: 1024} 2025/09/12 08:46:07 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:07 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:07 client -> Sending packet 2 (26 bytes) for connection a85d34dee898363ee1ff, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:07 client Short Header{DestConnectionID: 2899918f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:07 client Connection a85d34dee898363ee1ff closed. 2025/09/12 08:46:07 Requesting https://server4:443/npvqdqlvbz. 2025/09/12 08:46:07 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:07 Increased send buffer size to 14336 kiB 2025/09/12 08:46:07 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:07 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:07 Created qlog file: /logs/qlog/e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024.sqlog 2025/09/12 08:46:07 client Starting new connection to server4 ([::]:58623 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, version v1 2025/09/12 08:46:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:07 client -> Sending packet 0 (1280 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 08:46:07 client -> Sending packet 1 (1280 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 285, Offset + Data length: 1513} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:07 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56dd8d86, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:07 client Received first packet. Switching destination connection ID to: 56dd8d86 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [0] 2025/09/12 08:46:07 client updated RTT: 31.96051ms (σ: 15.980255ms) 2025/09/12 08:46:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:07 client -> Sending packet 2 (1280 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 285, Offset + Data length: 1513} 2025/09/12 08:46:07 client -> Sending packet 3 (1280 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:07 client -> &wire.CryptoFrame{Offset: 1228, Data length: 285, Offset + Data length: 1513} 2025/09/12 08:46:07 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56dd8d86, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:07 client -> Sending packet 4 (1280 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:07 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56dd8d86, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:07 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:07 client newly acked packets (1): [3] 2025/09/12 08:46:07 client updated RTT: 32.28ms (σ: 12.625ms) 2025/09/12 08:46:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:07 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56dd8d86, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, InitialSourceConnectionID: 56dd8d86, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc7b23316577e1e6fe7777b95912125d2, EnableResetStreamAt: false} 2025/09/12 08:46:08 client -> Sending packet 0 (75 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:08 client Dropping Initial keys. 2025/09/12 08:46:08 client -> Sending packet 0 (42 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: 56dd8d86, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:08 client <- Reading packet 2 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56dd8d86, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:08 client -> Sending packet 1 (36 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:08 client -> Sending packet 2 (70 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:08 client -> Sending packet 3 (70 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: 56dd8d86, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:08 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d7d23b8, StatelessResetToken: 0x593ee0b40914dbfcb3f31fa712a1ff6c} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b8731490, StatelessResetToken: 0x6052bbb204c41c7cdb212b86f12249cc} 2025/09/12 08:46:08 client <- &wire.NewTokenFrame{Token: 0x8292cf9b92920f4c9c730c81ff65fec0438fb53f8566a90629937c7fbe4cb798edba3dae4854c984887addeeb1d34c43b6b3a6234b89d8099946498b8adbdb2e7ed539b3e8284b694da420c19c7166c739228a3105211f0893d788} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8860c85, StatelessResetToken: 0xd53004b19d7289a6ed07cc38916dd436} 2025/09/12 08:46:08 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:08 client Dropping Handshake keys. 2025/09/12 08:46:08 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:08 client -> Sending packet 2 (52 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: b8731490, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 151.432µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:08 client -> Sending packet 3 (44 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: b8731490, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:08 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8860c85, StatelessResetToken: 0xd53004b19d7289a6ed07cc38916dd436} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:08 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:08 client <- &wire.NewTokenFrame{Token: 0x8292cf9b92920f4c9c730c81ff65fec0438fb53f8566a90629937c7fbe4cb798edba3dae4854c984887addeeb1d34c43b6b3a6234b89d8099946498b8adbdb2e7ed539b3e8284b694da420c19c7166c739228a3105211f0893d788} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b8731490, StatelessResetToken: 0x6052bbb204c41c7cdb212b86f12249cc} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d7d23b8, StatelessResetToken: 0x593ee0b40914dbfcb3f31fa712a1ff6c} 2025/09/12 08:46:08 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:08 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:08 client -> Sending packet 4 (32 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: b8731490, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.318651ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:08 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:08 client newly acked packets (1): [3] 2025/09/12 08:46:08 client updated RTT: 32.108ms (σ: 9.812ms) 2025/09/12 08:46:08 client ECN capability confirmed. 2025/09/12 08:46:08 client Canceling loss detection timer. 2025/09/12 08:46:08 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:08 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:08 client -> Sending packet 5 (35 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: b8731490, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 112.86µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:08 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:08 client -> Sending packet 6 (26 bytes) for connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: b8731490, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:08 client Connection e560a98bb6d7ee3eca9c6a6c0f13de60cc53f024 closed. 2025/09/12 08:46:08 Requesting https://server4:443/rlwitghoae. 2025/09/12 08:46:08 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:08 Increased send buffer size to 14336 kiB 2025/09/12 08:46:08 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:08 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:08 Created qlog file: /logs/qlog/a935c4a028aa4fc611a4569150998a69b4362d.sqlog 2025/09/12 08:46:08 client Starting new connection to server4 ([::]:44663 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a935c4a028aa4fc611a4569150998a69b4362d, version v1 2025/09/12 08:46:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:08 client -> Sending packet 0 (1280 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: a935c4a028aa4fc611a4569150998a69b4362d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:08 client -> Sending packet 1 (1280 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: a935c4a028aa4fc611a4569150998a69b4362d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 08:46:08 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7ee8b785, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:08 client Received first packet. Switching destination connection ID to: 7ee8b785 2025/09/12 08:46:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:08 client newly acked packets (1): [0] 2025/09/12 08:46:08 client updated RTT: 32.03649ms (σ: 16.018245ms) 2025/09/12 08:46:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:08 client -> Sending packet 2 (1280 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 7ee8b785, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 08:46:08 client -> Sending packet 3 (1280 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 7ee8b785, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 client Parsed a coalesced packet. Part 1: 750 bytes. Remaining: 91 bytes. 2025/09/12 08:46:08 client Queueing packet (750 bytes) for later decryption 2025/09/12 08:46:08 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:08 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7ee8b785, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:08 client newly acked packets (1): [3] 2025/09/12 08:46:08 client updated RTT: 32.324ms (σ: 12.59ms) 2025/09/12 08:46:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:08 client -> Sending packet 4 (1280 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 7ee8b785, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.PingFrame{} 2025/09/12 08:46:08 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7ee8b785, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:08 client -> Sending packet 5 (1280 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 7ee8b785, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:08 client <- Reading packet 0 (750 bytes) for connection (empty), Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7ee8b785, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 08:46:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a935c4a028aa4fc611a4569150998a69b4362d, InitialSourceConnectionID: 7ee8b785, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xac32633c02ebfcab670957d51d0025f2, EnableResetStreamAt: false} 2025/09/12 08:46:08 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ada442fa, StatelessResetToken: 0x55e4a34088f3c1b8d24b89c31bda2d5b} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcdc10b4, StatelessResetToken: 0x982ccf5f91a13f98ec76e4963e22ed4b} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 62888dd3, StatelessResetToken: 0xe4a3f4a093f4a9469263930b785dcd9a} 2025/09/12 08:46:08 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:08 client -> Sending packet 0 (100 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: ada442fa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:08 client Short Header{DestConnectionID: ada442fa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:08 client Dropping Initial keys. 2025/09/12 08:46:08 client -> Sending packet 1 (50 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: ada442fa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.185761ms} 2025/09/12 08:46:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:08 client -> Sending packet 1 (70 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: ada442fa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:08 client -> Sending packet 2 (70 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, Handshake 2025/09/12 08:46:08 client Long Header{Type: Handshake, DestConnectionID: ada442fa, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:08 client <- Reading packet 2 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcdc10b4, StatelessResetToken: 0x982ccf5f91a13f98ec76e4963e22ed4b} 2025/09/12 08:46:08 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:08 client Dropping Handshake keys. 2025/09/12 08:46:08 client <- &wire.NewTokenFrame{Token: 0xa34c13bd8ff5971d836289bf565aead322b58c9369bac97698f89eb63ceaa8b3bcfbb7b544f8f64df447b9f476d1ad5d1bfa99bb5f72d4308737b5bf91c65ee875169279076940a77c3ab9e8ed89377c54ee5865a5fd4271cd} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ada442fa, StatelessResetToken: 0x55e4a34088f3c1b8d24b89c31bda2d5b} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 62888dd3, StatelessResetToken: 0xe4a3f4a093f4a9469263930b785dcd9a} 2025/09/12 08:46:08 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:08 client -> Sending packet 3 (35 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: ada442fa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 198.198µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:08 client Skipping packet number 2 2025/09/12 08:46:08 client -> Sending packet 4 (42 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: ada442fa, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:08 client <- Reading packet 3 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 62888dd3, StatelessResetToken: 0xe4a3f4a093f4a9469263930b785dcd9a} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcdc10b4, StatelessResetToken: 0x982ccf5f91a13f98ec76e4963e22ed4b} 2025/09/12 08:46:08 client <- &wire.NewTokenFrame{Token: 0xa34c13bd8ff5971d836289bf565aead322b58c9369bac97698f89eb63ceaa8b3bcfbb7b544f8f64df447b9f476d1ad5d1bfa99bb5f72d4308737b5bf91c65ee875169279076940a77c3ab9e8ed89377c54ee5865a5fd4271cd} 2025/09/12 08:46:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ada442fa, StatelessResetToken: 0x55e4a34088f3c1b8d24b89c31bda2d5b} 2025/09/12 08:46:08 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:08 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:08 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:08 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:08 client -> Sending packet 5 (35 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: ada442fa, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 118.881µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:08 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:08 client -> Sending packet 6 (26 bytes) for connection a935c4a028aa4fc611a4569150998a69b4362d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:08 client Short Header{DestConnectionID: ada442fa, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:08 client Connection a935c4a028aa4fc611a4569150998a69b4362d closed. 2025/09/12 08:46:08 Requesting https://server4:443/fbpunwgsod. 2025/09/12 08:46:08 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:08 Increased send buffer size to 14336 kiB 2025/09/12 08:46:08 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:08 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:08 Created qlog file: /logs/qlog/936645f3595aa616bac1c19fd5c6011a0aaa18.sqlog 2025/09/12 08:46:08 client Starting new connection to server4 ([::]:54629 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 936645f3595aa616bac1c19fd5c6011a0aaa18, version v1 2025/09/12 08:46:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:08 client -> Sending packet 0 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 936645f3595aa616bac1c19fd5c6011a0aaa18, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:08 client -> Sending packet 1 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 936645f3595aa616bac1c19fd5c6011a0aaa18, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51237fc9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:08 client Received first packet. Switching destination connection ID to: 51237fc9 2025/09/12 08:46:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:08 client newly acked packets (1): [0] 2025/09/12 08:46:08 client updated RTT: 32.079658ms (σ: 16.039829ms) 2025/09/12 08:46:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:08 client -> Sending packet 2 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 51237fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/12 08:46:08 client -> Sending packet 3 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 51237fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:08 client -> Sending packet 4 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 51237fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/12 08:46:08 client -> Sending packet 5 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:08 client Long Header{Type: Initial, DestConnectionID: 51237fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 1229, Data length: 289, Offset + Data length: 1518} 2025/09/12 08:46:08 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:09 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51237fc9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client -> Sending packet 6 (1280 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: 51237fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:09 client Parsed a coalesced packet. Part 1: 756 bytes. Remaining: 91 bytes. 2025/09/12 08:46:09 client <- Reading packet 0 (756 bytes) for connection (empty), Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 51237fc9, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 08:46:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 936645f3595aa616bac1c19fd5c6011a0aaa18, InitialSourceConnectionID: 51237fc9, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x615b44088339bf9ce9e2ed0b299916f0, EnableResetStreamAt: false} 2025/09/12 08:46:09 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e9c9079, StatelessResetToken: 0xa60b5bcd9bc68412b5fdb9c2f5d12725} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 67296450, StatelessResetToken: 0x155bdd6b64001e3c83c3fcd5234ef5af} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 723f2988, StatelessResetToken: 0x550516df1a8f89d797a8b6f8acc53155} 2025/09/12 08:46:09 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:09 client -> Sending packet 0 (119 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: 2e9c9079, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:09 client Short Header{DestConnectionID: 2e9c9079, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:09 client Dropping Initial keys. 2025/09/12 08:46:09 client -> Sending packet 1 (29 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: 2e9c9079, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600.829µs} 2025/09/12 08:46:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:09 client -> Sending packet 1 (70 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: 2e9c9079, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:09 client -> Sending packet 2 (70 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: 2e9c9079, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:09 client <- Reading packet 2 (286 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:09 client Dropping Handshake keys. 2025/09/12 08:46:09 client <- &wire.NewTokenFrame{Token: 0x43175d280e1790cd40c276f844ce82b4872f1989489023a65dc812866f4e83dadabe67a643f14dd3c2e24291fd3b82fd391f2e476a9463b93f596db928dfdea4309f0ceb618528f5cf469340cc465733b63588a550a41ab5e5} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:09 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:09 client -> Sending packet 3 (54 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: 2e9c9079, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 154.788µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:09 client -> Sending packet 4 (44 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: 2e9c9079, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:09 client <- Reading packet 3 (27 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 216µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client newly acked packets (1): [4] 2025/09/12 08:46:09 client updated RTT: 31.941ms (σ: 12.304ms) 2025/09/12 08:46:09 client ECN capability confirmed. 2025/09/12 08:46:09 client Canceling loss detection timer. 2025/09/12 08:46:09 client <- Reading packet 7 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:09 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:09 client -> Sending packet 5 (35 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: 2e9c9079, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 119.271µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:09 client -> Sending packet 6 (26 bytes) for connection 936645f3595aa616bac1c19fd5c6011a0aaa18, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: 2e9c9079, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:09 client Connection 936645f3595aa616bac1c19fd5c6011a0aaa18 closed. 2025/09/12 08:46:09 Requesting https://server4:443/yeguwfhjhl. 2025/09/12 08:46:09 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:09 Increased send buffer size to 14336 kiB 2025/09/12 08:46:09 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:09 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:09 Created qlog file: /logs/qlog/a43d56774840a49bbfb2e4.sqlog 2025/09/12 08:46:09 client Starting new connection to server4 ([::]:56341 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a43d56774840a49bbfb2e4, version v1 2025/09/12 08:46:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:09 client -> Sending packet 0 (1280 bytes) for connection a43d56774840a49bbfb2e4, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: a43d56774840a49bbfb2e4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:09 client -> Sending packet 1 (1280 bytes) for connection a43d56774840a49bbfb2e4, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: a43d56774840a49bbfb2e4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:09 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0b86b1a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:09 client Received first packet. Switching destination connection ID to: a0b86b1a 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:09 client newly acked packets (1): [0] 2025/09/12 08:46:09 client updated RTT: 31.996263ms (σ: 15.998131ms) 2025/09/12 08:46:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:09 client -> Sending packet 2 (1280 bytes) for connection a43d56774840a49bbfb2e4, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: a0b86b1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/09/12 08:46:09 client -> Sending packet 3 (1280 bytes) for connection a43d56774840a49bbfb2e4, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: a0b86b1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 1237, Data length: 270, Offset + Data length: 1507} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:09 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0b86b1a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:09 client newly acked packets (1): [3] 2025/09/12 08:46:09 client updated RTT: 32.141ms (σ: 12.289ms) 2025/09/12 08:46:09 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0b86b1a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client -> Sending packet 4 (1280 bytes) for connection a43d56774840a49bbfb2e4, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: a0b86b1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:09 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0b86b1a, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:09 client -> Sending packet 5 (1280 bytes) for connection a43d56774840a49bbfb2e4, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: a0b86b1a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:09 client <- Reading packet 1 (755 bytes) for connection (empty), Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a0b86b1a, PacketNumber: 1, PacketNumberLen: 2, Length: 742, Version: v1} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/09/12 08:46:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a43d56774840a49bbfb2e4, InitialSourceConnectionID: a0b86b1a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xfa49c08b1ffb56fc32059e59feeee469, EnableResetStreamAt: false} 2025/09/12 08:46:09 client -> Sending packet 0 (75 bytes) for connection a43d56774840a49bbfb2e4, Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: a0b86b1a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:09 client Dropping Initial keys. 2025/09/12 08:46:09 client -> Sending packet 0 (42 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: a0b86b1a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:09 client <- Reading packet 2 (755 bytes) for connection (empty), Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a0b86b1a, PacketNumber: 2, PacketNumberLen: 2, Length: 742, Version: v1} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/09/12 08:46:09 client -> Sending packet 1 (36 bytes) for connection a43d56774840a49bbfb2e4, Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: a0b86b1a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:09 client <- Reading packet 2 (368 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client Peer doesn't await address validation any longer. 2025/09/12 08:46:09 client newly acked packets (1): [0] 2025/09/12 08:46:09 client updated RTT: 32.056ms (σ: 9.385ms) 2025/09/12 08:46:09 client ECN capability confirmed. 2025/09/12 08:46:09 client Canceling loss detection timer. 2025/09/12 08:46:09 client Dropping Handshake keys. 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:09 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:09 client <- &wire.NewTokenFrame{Token: 0x1d548704cdc15ae73f03fc663e3c9380e3a792611396d523480f5fcff64ee981e37c6378a0db384a061cd5a2e5a883cb3350bc0cae457e85016e4a24936462ec7f28c2877d3acf7cb8ab34e8f97edf7b27021770c45fda80bdf53f} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64e36a97, StatelessResetToken: 0xae095445b6e5b9905ccdbfc06183d431} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ef942190, StatelessResetToken: 0x63b63f66d7ab390b79b9e384ade6f157} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: caafa8fa, StatelessResetToken: 0x15d62354400020154a77cc7fe126ae81} 2025/09/12 08:46:09 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:09 client -> Sending packet 1 (33 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: caafa8fa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 193.931µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.NewTokenFrame{Token: 0x1d548704cdc15ae73f03fc663e3c9380e3a792611396d523480f5fcff64ee981e37c6378a0db384a061cd5a2e5a883cb3350bc0cae457e85016e4a24936462ec7f28c2877d3acf7cb8ab34e8f97edf7b27021770c45fda80bdf53f} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64e36a97, StatelessResetToken: 0xae095445b6e5b9905ccdbfc06183d431} 2025/09/12 08:46:09 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: caafa8fa, StatelessResetToken: 0x15d62354400020154a77cc7fe126ae81} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ef942190, StatelessResetToken: 0x63b63f66d7ab390b79b9e384ade6f157} 2025/09/12 08:46:09 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:09 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:09 client -> Sending packet 2 (32 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: caafa8fa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.298501ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:09 client -> Sending packet 4 (25 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: caafa8fa, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client -> Sending packet 5 (25 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: caafa8fa, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client <- Reading packet 5 (31 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 112µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client newly acked packets (1): [5] 2025/09/12 08:46:09 client updated RTT: 31.923ms (σ: 7.302ms) 2025/09/12 08:46:09 client Canceling loss detection timer. 2025/09/12 08:46:09 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:09 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:09 client -> Sending packet 6 (35 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: caafa8fa, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 74.289µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:09 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:09 client -> Sending packet 7 (26 bytes) for connection a43d56774840a49bbfb2e4, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: caafa8fa, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:09 client Connection a43d56774840a49bbfb2e4 closed. 2025/09/12 08:46:09 Requesting https://server4:443/hxinvndvtx. 2025/09/12 08:46:09 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:09 Increased send buffer size to 14336 kiB 2025/09/12 08:46:09 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:09 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:09 Created qlog file: /logs/qlog/491822862e336e7796355787ba7dcff535a24c.sqlog 2025/09/12 08:46:09 client Starting new connection to server4 ([::]:50981 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 491822862e336e7796355787ba7dcff535a24c, version v1 2025/09/12 08:46:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:09 client -> Sending packet 0 (1280 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: 491822862e336e7796355787ba7dcff535a24c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:09 client -> Sending packet 1 (1280 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: 491822862e336e7796355787ba7dcff535a24c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 1229, Data length: 279, Offset + Data length: 1508} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:09 client Parsed a coalesced packet. Part 1: 756 bytes. Remaining: 91 bytes. 2025/09/12 08:46:09 client Queueing packet (756 bytes) for later decryption 2025/09/12 08:46:09 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:09 client -> Sending packet 2 (1280 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: 491822862e336e7796355787ba7dcff535a24c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:09 client -> Sending packet 3 (1280 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: 491822862e336e7796355787ba7dcff535a24c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 1229, Data length: 279, Offset + Data length: 1508} 2025/09/12 08:46:09 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c8286e08, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:09 client Received first packet. Switching destination connection ID to: c8286e08 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:09 client newly acked packets (1): [2] 2025/09/12 08:46:09 client updated RTT: 32.005766ms (σ: 16.002883ms) 2025/09/12 08:46:09 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c8286e08, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:09 client newly acked packets (1): [3] 2025/09/12 08:46:09 client updated RTT: 32.241ms (σ: 12.475ms) 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client -> Sending packet 4 (1280 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Initial 2025/09/12 08:46:09 client Long Header{Type: Initial, DestConnectionID: c8286e08, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:09 client <- Reading packet 0 (756 bytes) for connection (empty), Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c8286e08, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 08:46:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 08:46:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 491822862e336e7796355787ba7dcff535a24c, InitialSourceConnectionID: c8286e08, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x139cf8189ea725e03e9d817d1512dcda, EnableResetStreamAt: false} 2025/09/12 08:46:09 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b9e86cf3, StatelessResetToken: 0x90a686700938231df3a252c0b35d9a1f} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9322d404, StatelessResetToken: 0xa2d97deda58e6a17039444bccc9307d8} 2025/09/12 08:46:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fc0b2e8f, StatelessResetToken: 0x4508f7902d884e11efa4fe651cab5a65} 2025/09/12 08:46:09 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:09 client -> Sending packet 0 (100 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Handshake 2025/09/12 08:46:09 client Long Header{Type: Handshake, DestConnectionID: fc0b2e8f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:09 client Short Header{DestConnectionID: fc0b2e8f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:09 client Dropping Initial keys. 2025/09/12 08:46:09 client -> Sending packet 1 (31 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: fc0b2e8f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.238704ms} 2025/09/12 08:46:09 client -> Sending packet 2 (42 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:09 client Short Header{DestConnectionID: fc0b2e8f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:09 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/09/12 08:46:10 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:10 client -> Sending packet 1 (70 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: fc0b2e8f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:10 client -> Sending packet 2 (70 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: fc0b2e8f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:10 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.PingFrame{} 2025/09/12 08:46:10 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:10 client <- Reading packet 5 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 82.496ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:10 client Peer doesn't await address validation any longer. 2025/09/12 08:46:10 client newly acked packets (1): [2] 2025/09/12 08:46:10 client updated RTT: 39.365ms (σ: 23.606ms) 2025/09/12 08:46:10 client ECN capability confirmed. 2025/09/12 08:46:10 client lost packet 0 (time threshold) 2025/09/12 08:46:10 client Canceling loss detection timer. 2025/09/12 08:46:10 client Dropping Handshake keys. 2025/09/12 08:46:10 client -> Sending packet 3 (35 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: fc0b2e8f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 151.632µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:10 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:10 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:10 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:10 client -> Sending packet 4 (26 bytes) for connection 491822862e336e7796355787ba7dcff535a24c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: fc0b2e8f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:10 client Connection 491822862e336e7796355787ba7dcff535a24c closed. 2025/09/12 08:46:10 Requesting https://server4:443/evewhtxjqv. 2025/09/12 08:46:10 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:10 Increased send buffer size to 14336 kiB 2025/09/12 08:46:10 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:10 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:10 Created qlog file: /logs/qlog/33e04d980f10832fec671200151b09dbca.sqlog 2025/09/12 08:46:10 client Starting new connection to server4 ([::]:55947 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 33e04d980f10832fec671200151b09dbca, version v1 2025/09/12 08:46:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:10 client -> Sending packet 0 (1280 bytes) for connection 33e04d980f10832fec671200151b09dbca, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 33e04d980f10832fec671200151b09dbca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 08:46:10 client -> Sending packet 1 (1280 bytes) for connection 33e04d980f10832fec671200151b09dbca, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 33e04d980f10832fec671200151b09dbca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:10 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2592f89, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:10 client Received first packet. Switching destination connection ID to: b2592f89 2025/09/12 08:46:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:10 client newly acked packets (1): [0] 2025/09/12 08:46:10 client updated RTT: 31.978755ms (σ: 15.989377ms) 2025/09/12 08:46:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:10 client -> Sending packet 2 (1280 bytes) for connection 33e04d980f10832fec671200151b09dbca, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: b2592f89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 08:46:10 client -> Sending packet 3 (1280 bytes) for connection 33e04d980f10832fec671200151b09dbca, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: b2592f89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 1231, Data length: 283, Offset + Data length: 1514} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:10 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2592f89, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:10 client newly acked packets (1): [3] 2025/09/12 08:46:10 client updated RTT: 32.281ms (σ: 12.599ms) 2025/09/12 08:46:10 client -> Sending packet 4 (1280 bytes) for connection 33e04d980f10832fec671200151b09dbca, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: b2592f89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.PingFrame{} 2025/09/12 08:46:10 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2592f89, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:10 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:10 client newly acked packets (1): [4] 2025/09/12 08:46:10 client updated RTT: 32.241ms (σ: 9.528ms) 2025/09/12 08:46:10 client <- Reading packet 5 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2592f89, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client -> Sending packet 5 (1280 bytes) for connection 33e04d980f10832fec671200151b09dbca, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: b2592f89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:10 client <- Reading packet 3 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2592f89, PacketNumber: 3, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 33e04d980f10832fec671200151b09dbca, InitialSourceConnectionID: b2592f89, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf232626ae7c4cc8cfd6c388bb632bfc9, EnableResetStreamAt: false} 2025/09/12 08:46:10 client -> Sending packet 0 (75 bytes) for connection 33e04d980f10832fec671200151b09dbca, Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: b2592f89, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:10 client Dropping Initial keys. 2025/09/12 08:46:10 client <- Reading packet 4 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2592f89, PacketNumber: 4, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:10 client -> Sending packet 1 (36 bytes) for connection 33e04d980f10832fec671200151b09dbca, Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: b2592f89, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 08:46:10 client -> Sending packet 0 (42 bytes) for connection 33e04d980f10832fec671200151b09dbca, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: b2592f89, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:10 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 444f44b1, StatelessResetToken: 0xa620424c559aa8b9120593a160088a6b} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 286be8dc, StatelessResetToken: 0xc003d26fc4c6e18f0b74944a35fe6ae3} 2025/09/12 08:46:10 client <- &wire.NewTokenFrame{Token: 0xdc70819bed8c2b1b5f40b0550d251eace21edea611e28e50a790b523d2dc53e8047b7b9f573405a8216e5d72a8833c91d14b34fd4bbbd76076682904eeaa9157bf53ec3e8225c2f48f9f389d2e2afb71565f7aa28ffbd4e50a113e} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 978c2e44, StatelessResetToken: 0xf4f0d10133dd489057c6c5af59c1519b} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:10 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:10 client Dropping Handshake keys. 2025/09/12 08:46:10 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:10 client -> Sending packet 1 (33 bytes) for connection 33e04d980f10832fec671200151b09dbca, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: 444f44b1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 108.191µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:10 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 286be8dc, StatelessResetToken: 0xc003d26fc4c6e18f0b74944a35fe6ae3} 2025/09/12 08:46:10 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:10 client <- &wire.NewTokenFrame{Token: 0xdc70819bed8c2b1b5f40b0550d251eace21edea611e28e50a790b523d2dc53e8047b7b9f573405a8216e5d72a8833c91d14b34fd4bbbd76076682904eeaa9157bf53ec3e8225c2f48f9f389d2e2afb71565f7aa28ffbd4e50a113e} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 978c2e44, StatelessResetToken: 0xf4f0d10133dd489057c6c5af59c1519b} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 444f44b1, StatelessResetToken: 0xa620424c559aa8b9120593a160088a6b} 2025/09/12 08:46:10 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:10 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:10 client -> Sending packet 2 (33 bytes) for connection 33e04d980f10832fec671200151b09dbca, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: 444f44b1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 57.347µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:10 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:10 client -> Sending packet 3 (26 bytes) for connection 33e04d980f10832fec671200151b09dbca, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: 444f44b1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:10 client Connection 33e04d980f10832fec671200151b09dbca closed. 2025/09/12 08:46:10 Requesting https://server4:443/szxmtnflfm. 2025/09/12 08:46:10 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:10 Increased send buffer size to 14336 kiB 2025/09/12 08:46:10 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:10 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:10 Created qlog file: /logs/qlog/531ed6df459bf1b16c08d74679.sqlog 2025/09/12 08:46:10 client Starting new connection to server4 ([::]:33967 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 531ed6df459bf1b16c08d74679, version v1 2025/09/12 08:46:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:10 client -> Sending packet 0 (1280 bytes) for connection 531ed6df459bf1b16c08d74679, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 531ed6df459bf1b16c08d74679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:10 client -> Sending packet 1 (1280 bytes) for connection 531ed6df459bf1b16c08d74679, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 531ed6df459bf1b16c08d74679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:10 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c543596, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:10 client Received first packet. Switching destination connection ID to: 3c543596 2025/09/12 08:46:10 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:10 client newly acked packets (1): [0] 2025/09/12 08:46:10 client updated RTT: 31.971584ms (σ: 15.985792ms) 2025/09/12 08:46:10 client Parsed a coalesced packet. Part 1: 753 bytes. Remaining: 91 bytes. 2025/09/12 08:46:10 client Queueing packet (753 bytes) for later decryption 2025/09/12 08:46:10 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:10 client -> Sending packet 2 (1280 bytes) for connection 531ed6df459bf1b16c08d74679, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 3c543596, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:10 client -> Sending packet 3 (1280 bytes) for connection 531ed6df459bf1b16c08d74679, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 3c543596, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:10 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c543596, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client -> Sending packet 4 (1280 bytes) for connection 531ed6df459bf1b16c08d74679, Initial 2025/09/12 08:46:10 client Long Header{Type: Initial, DestConnectionID: 3c543596, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:10 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3c543596, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 531ed6df459bf1b16c08d74679, InitialSourceConnectionID: 3c543596, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa8b86f1993d667a09baabc14b9b7e82b, EnableResetStreamAt: false} 2025/09/12 08:46:10 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:10 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 87f91db1, StatelessResetToken: 0xf8d8c39c95af16757cc0465ae454d16c} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1f1520c, StatelessResetToken: 0xffe3b5be9ab0ab7e8d39a570dc637473} 2025/09/12 08:46:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a6ee6bb, StatelessResetToken: 0x96fa366c41776d1a1ba0806c37a8b3c8} 2025/09/12 08:46:10 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:10 client -> Sending packet 0 (100 bytes) for connection 531ed6df459bf1b16c08d74679, Handshake 2025/09/12 08:46:10 client Long Header{Type: Handshake, DestConnectionID: 9a6ee6bb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:10 client Short Header{DestConnectionID: 9a6ee6bb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:10 client Dropping Initial keys. 2025/09/12 08:46:10 client -> Sending packet 1 (50 bytes) for connection 531ed6df459bf1b16c08d74679, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:10 client Short Header{DestConnectionID: 9a6ee6bb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.906282ms} 2025/09/12 08:46:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:11 client -> Sending packet 1 (70 bytes) for connection 531ed6df459bf1b16c08d74679, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: 9a6ee6bb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:11 client -> Sending packet 2 (70 bytes) for connection 531ed6df459bf1b16c08d74679, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: 9a6ee6bb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:11 client <- Reading packet 2 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:11 client Dropping Handshake keys. 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a6ee6bb, StatelessResetToken: 0x96fa366c41776d1a1ba0806c37a8b3c8} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 87f91db1, StatelessResetToken: 0xf8d8c39c95af16757cc0465ae454d16c} 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1f1520c, StatelessResetToken: 0xffe3b5be9ab0ab7e8d39a570dc637473} 2025/09/12 08:46:11 client <- &wire.NewTokenFrame{Token: 0xd507599adc98a28536014eec116bee3aae632e4c3661228eda1ef1a61d08699347eec2064649bac2411a951d4055d96b448236196068fed594e17a0045bb450a798d8c9398eebe98441305048dcef8a2f91193f4573dd394f6} 2025/09/12 08:46:11 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:11 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:11 client -> Sending packet 3 (35 bytes) for connection 531ed6df459bf1b16c08d74679, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: 9a6ee6bb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 157.963µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:11 client Skipping packet number 2 2025/09/12 08:46:11 client -> Sending packet 4 (42 bytes) for connection 531ed6df459bf1b16c08d74679, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: 9a6ee6bb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:11 client <- Reading packet 3 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:11 client <- &wire.NewTokenFrame{Token: 0xd507599adc98a28536014eec116bee3aae632e4c3661228eda1ef1a61d08699347eec2064649bac2411a951d4055d96b448236196068fed594e17a0045bb450a798d8c9398eebe98441305048dcef8a2f91193f4573dd394f6} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 87f91db1, StatelessResetToken: 0xf8d8c39c95af16757cc0465ae454d16c} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a6ee6bb, StatelessResetToken: 0x96fa366c41776d1a1ba0806c37a8b3c8} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1f1520c, StatelessResetToken: 0xffe3b5be9ab0ab7e8d39a570dc637473} 2025/09/12 08:46:11 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:11 client <- Reading packet 5 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96.36ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:11 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:11 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:11 client -> Sending packet 5 (35 bytes) for connection 531ed6df459bf1b16c08d74679, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: 9a6ee6bb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 57.607µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:11 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:11 client -> Sending packet 6 (26 bytes) for connection 531ed6df459bf1b16c08d74679, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: 9a6ee6bb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:11 client Connection 531ed6df459bf1b16c08d74679 closed. 2025/09/12 08:46:11 Requesting https://server4:443/ktccmkksml. 2025/09/12 08:46:11 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:11 Increased send buffer size to 14336 kiB 2025/09/12 08:46:11 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:11 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:11 Created qlog file: /logs/qlog/4ed6b23352e1f88d8bf3202d80c700.sqlog 2025/09/12 08:46:11 client Starting new connection to server4 ([::]:54759 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4ed6b23352e1f88d8bf3202d80c700, version v1 2025/09/12 08:46:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:11 client -> Sending packet 0 (1280 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 4ed6b23352e1f88d8bf3202d80c700, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:11 client -> Sending packet 1 (1280 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 4ed6b23352e1f88d8bf3202d80c700, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 1233, Data length: 276, Offset + Data length: 1509} 2025/09/12 08:46:11 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dbc66f29, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:11 client Received first packet. Switching destination connection ID to: dbc66f29 2025/09/12 08:46:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:11 client newly acked packets (2): [0 1] 2025/09/12 08:46:11 client updated RTT: 34.32166ms (σ: 17.16083ms) 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client -> Sending packet 2 (1280 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: dbc66f29, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:11 client Parsed a coalesced packet. Part 1: 747 bytes. Remaining: 91 bytes. 2025/09/12 08:46:11 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dbc66f29, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 08:46:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4ed6b23352e1f88d8bf3202d80c700, InitialSourceConnectionID: dbc66f29, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x1e7747b2fc46ca28adbc20bb70f5c4d1, EnableResetStreamAt: false} 2025/09/12 08:46:11 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 18c0ecb2, StatelessResetToken: 0xc7526fc060bfbc0d0456ac5fa48fd62b} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b597b153, StatelessResetToken: 0x43287d0dbafc4ff87b6107c1ec983a25} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 605256f6, StatelessResetToken: 0xa89efd14d7052d2710e116385d3504e8} 2025/09/12 08:46:11 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:11 client -> Sending packet 0 (100 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: 605256f6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:11 client Short Header{DestConnectionID: 605256f6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:11 client Dropping Initial keys. 2025/09/12 08:46:11 client -> Sending packet 1 (47 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: 605256f6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 434.879µs} 2025/09/12 08:46:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:11 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:11 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:11 client -> Sending packet 2 (33 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: 605256f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80.61µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:11 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:11 client -> Sending packet 1 (61 bytes) for connection 4ed6b23352e1f88d8bf3202d80c700, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: 605256f6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 08:46:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:11 client Short Header{DestConnectionID: 605256f6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:11 client Connection 4ed6b23352e1f88d8bf3202d80c700 closed. 2025/09/12 08:46:11 Requesting https://server4:443/vsbzbkftzb. 2025/09/12 08:46:11 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:11 Increased send buffer size to 14336 kiB 2025/09/12 08:46:11 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:11 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:11 Created qlog file: /logs/qlog/9494a3a6b986e1ecd5c339de94f47b.sqlog 2025/09/12 08:46:11 client Starting new connection to server4 ([::]:33407 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9494a3a6b986e1ecd5c339de94f47b, version v1 2025/09/12 08:46:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:11 client -> Sending packet 0 (1280 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 9494a3a6b986e1ecd5c339de94f47b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:11 client -> Sending packet 1 (1280 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 9494a3a6b986e1ecd5c339de94f47b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:11 client -> Sending packet 2 (1280 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 9494a3a6b986e1ecd5c339de94f47b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:11 client -> Sending packet 3 (1280 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 9494a3a6b986e1ecd5c339de94f47b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/12 08:46:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:11 client Parsed a coalesced packet. Part 1: 753 bytes. Remaining: 91 bytes. 2025/09/12 08:46:11 client Queueing packet (753 bytes) for later decryption 2025/09/12 08:46:11 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:11 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23ec59d9, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:11 client Received first packet. Switching destination connection ID to: 23ec59d9 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client -> Sending packet 4 (1280 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 23ec59d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 08:46:11 client <- Reading packet 0 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23ec59d9, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9494a3a6b986e1ecd5c339de94f47b, InitialSourceConnectionID: 23ec59d9, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x2795d010ed1c7c2ee52e50383bf4dc5d, EnableResetStreamAt: false} 2025/09/12 08:46:11 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ea2867c9, StatelessResetToken: 0xfb747a014e2000be78a1c437b08b5c40} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8f4fc721, StatelessResetToken: 0xc06796f209e459c936102a0f2cdd5644} 2025/09/12 08:46:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f84754b1, StatelessResetToken: 0xd808dfe46fe59e46b4d02a8efeb7a212} 2025/09/12 08:46:11 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:11 client -> Sending packet 0 (100 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: ea2867c9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:11 client Short Header{DestConnectionID: ea2867c9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:11 client Dropping Initial keys. 2025/09/12 08:46:11 client -> Sending packet 1 (50 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: ea2867c9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 202.394782ms} 2025/09/12 08:46:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:11 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23ec59d9, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:11 client -> Sending packet 1 (36 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: ea2867c9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:11 client <- Reading packet 2 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23ec59d9, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:11 client -> Sending packet 2 (36 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: ea2867c9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:11 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:11 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:11 client -> Sending packet 2 (33 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:11 client Short Header{DestConnectionID: ea2867c9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 99.635µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:11 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:11 client -> Sending packet 3 (61 bytes) for connection 9494a3a6b986e1ecd5c339de94f47b, Handshake 2025/09/12 08:46:11 client Long Header{Type: Handshake, DestConnectionID: ea2867c9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 08:46:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:11 client Short Header{DestConnectionID: ea2867c9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:11 client Connection 9494a3a6b986e1ecd5c339de94f47b closed. 2025/09/12 08:46:11 Requesting https://server4:443/urgfcvppze. 2025/09/12 08:46:11 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:11 Increased send buffer size to 14336 kiB 2025/09/12 08:46:11 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:11 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:11 Created qlog file: /logs/qlog/59928d91cdeddfb1c340647cd363f97b3b65.sqlog 2025/09/12 08:46:11 client Starting new connection to server4 ([::]:38927 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 59928d91cdeddfb1c340647cd363f97b3b65, version v1 2025/09/12 08:46:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:11 client -> Sending packet 0 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 59928d91cdeddfb1c340647cd363f97b3b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:11 client -> Sending packet 1 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 59928d91cdeddfb1c340647cd363f97b3b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 1230, Data length: 281, Offset + Data length: 1511} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:11 client -> Sending packet 2 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 59928d91cdeddfb1c340647cd363f97b3b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:11 client -> Sending packet 3 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: 59928d91cdeddfb1c340647cd363f97b3b65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 1230, Data length: 281, Offset + Data length: 1511} 2025/09/12 08:46:11 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:11 client <- Reading packet 1 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79270af4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:11 client Received first packet. Switching destination connection ID to: 79270af4 2025/09/12 08:46:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:11 client newly acked packets (1): [2] 2025/09/12 08:46:11 client updated RTT: 32.082949ms (σ: 16.041474ms) 2025/09/12 08:46:11 client Parsed a coalesced packet. Part 1: 751 bytes. Remaining: 91 bytes. 2025/09/12 08:46:11 client Queueing packet (751 bytes) for later decryption 2025/09/12 08:46:11 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:12 client -> Sending packet 4 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:12 client -> &wire.CryptoFrame{Offset: 1230, Data length: 281, Offset + Data length: 1511} 2025/09/12 08:46:12 client -> Sending packet 5 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:12 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:12 client -> &wire.CryptoFrame{Offset: 1230, Data length: 281, Offset + Data length: 1511} 2025/09/12 08:46:12 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79270af4, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:12 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:12 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79270af4, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:12 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:12 client newly acked packets (1): [5] 2025/09/12 08:46:12 client updated RTT: 32.19ms (σ: 12.246ms) 2025/09/12 08:46:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:12 client Queueing packet (751 bytes) for later decryption 2025/09/12 08:46:12 client Queueing packet (751 bytes) for later decryption 2025/09/12 08:46:12 client -> Sending packet 6 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:12 client -> &wire.PingFrame{} 2025/09/12 08:46:12 client <- Reading packet 7 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79270af4, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:12 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:12 client newly acked packets (1): [6] 2025/09/12 08:46:12 client updated RTT: 32.164ms (σ: 9.235ms) 2025/09/12 08:46:12 client -> Sending packet 7 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:12 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:12 client -> &wire.PingFrame{} 2025/09/12 08:46:13 client Queueing packet (751 bytes) for later decryption 2025/09/12 08:46:13 client Queueing packet (751 bytes) for later decryption 2025/09/12 08:46:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/09/12 08:46:14 client -> Sending packet 8 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:14 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:14 client -> &wire.PingFrame{} 2025/09/12 08:46:14 client -> Sending packet 9 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:14 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:14 client -> &wire.PingFrame{} 2025/09/12 08:46:14 client <- Reading packet 11 (41 bytes) for connection (empty), Initial 2025/09/12 08:46:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79270af4, Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 08:46:14 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:14 client newly acked packets (1): [9] 2025/09/12 08:46:14 client updated RTT: 32.25ms (σ: 7.098ms) 2025/09/12 08:46:16 client -> Sending packet 10 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.PingFrame{} 2025/09/12 08:46:16 client <- Reading packet 12 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79270af4, Token: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client -> Sending packet 11 (1280 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 79270af4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 08:46:16 client <- Reading packet 0 (751 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79270af4, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 08:46:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 59928d91cdeddfb1c340647cd363f97b3b65, InitialSourceConnectionID: 79270af4, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xff8a5f344d3d5fa433c2e992dfcce00f, EnableResetStreamAt: false} 2025/09/12 08:46:16 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 15ab14c0, StatelessResetToken: 0x6b0638a527d15dad2fe8dc5ec9581391} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8718e868, StatelessResetToken: 0x7bb3244585a997d1e245313d6ff13740} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76ccc12c, StatelessResetToken: 0x0be3fe301854e6bf3d8233a04ae22f69} 2025/09/12 08:46:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:16 client <- Reading packet 1 (751 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79270af4, PacketNumber: 1, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 08:46:16 client <- Reading packet 2 (751 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79270af4, PacketNumber: 2, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 08:46:16 client <- Reading packet 3 (751 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79270af4, PacketNumber: 3, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 08:46:16 client <- Reading packet 4 (751 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79270af4, PacketNumber: 4, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 08:46:16 client -> Sending packet 0 (119 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: 76ccc12c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:16 client Short Header{DestConnectionID: 76ccc12c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:16 client Dropping Initial keys. 2025/09/12 08:46:16 client -> Sending packet 1 (31 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: 76ccc12c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.201593881s} 2025/09/12 08:46:16 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/09/12 08:46:16 client Dropping %!s(logging.PacketType=0) packet (41 bytes) because we already dropped the keys. 2025/09/12 08:46:16 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client Peer doesn't await address validation any longer. 2025/09/12 08:46:16 client newly acked packets (1): [0] 2025/09/12 08:46:16 client Canceling loss detection timer. 2025/09/12 08:46:16 client Dropping Handshake keys. 2025/09/12 08:46:16 client <- &wire.NewTokenFrame{Token: 0x0459a074a169de78f3ce99256b691a02eb25aa7d7356da1c24f7a13ae1143b00bea02d7f17994dc81549b589eadcca90def3d7436f5fe53f75ed173b8163b4d7b4a3f55d16f86bc87a927f9c96d54b0563f61becf1b0f96097aa55} 2025/09/12 08:46:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:16 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:16 client -> Sending packet 2 (31 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: 76ccc12c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 73.988µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:16 client -> Sending packet 3 (26 bytes) for connection 59928d91cdeddfb1c340647cd363f97b3b65, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: 76ccc12c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:16 client Connection 59928d91cdeddfb1c340647cd363f97b3b65 closed. 2025/09/12 08:46:16 Requesting https://server4:443/saqiuogdyr. 2025/09/12 08:46:16 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:16 Increased send buffer size to 14336 kiB 2025/09/12 08:46:16 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:16 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:16 Created qlog file: /logs/qlog/82fa59959e58b1f4e5b48950.sqlog 2025/09/12 08:46:16 client Starting new connection to server4 ([::]:40358 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 82fa59959e58b1f4e5b48950, version v1 2025/09/12 08:46:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:16 client -> Sending packet 0 (1280 bytes) for connection 82fa59959e58b1f4e5b48950, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 82fa59959e58b1f4e5b48950, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 08:46:16 client -> Sending packet 1 (1280 bytes) for connection 82fa59959e58b1f4e5b48950, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 82fa59959e58b1f4e5b48950, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 1236, Data length: 270, Offset + Data length: 1506} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:16 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 37a00d6f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:16 client Received first packet. Switching destination connection ID to: 37a00d6f 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 client newly acked packets (1): [0] 2025/09/12 08:46:16 client updated RTT: 31.945883ms (σ: 15.972941ms) 2025/09/12 08:46:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:16 client -> Sending packet 2 (1280 bytes) for connection 82fa59959e58b1f4e5b48950, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 37a00d6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 1236, Data length: 270, Offset + Data length: 1506} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:16 client -> Sending packet 3 (1280 bytes) for connection 82fa59959e58b1f4e5b48950, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 37a00d6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 1236, Data length: 270, Offset + Data length: 1506} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:16 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 37a00d6f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client -> Sending packet 4 (1280 bytes) for connection 82fa59959e58b1f4e5b48950, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 37a00d6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:16 client <- Reading packet 1 (750 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 37a00d6f, PacketNumber: 1, PacketNumberLen: 2, Length: 737, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 08:46:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 82fa59959e58b1f4e5b48950, InitialSourceConnectionID: 37a00d6f, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe4a838b18c3294e3c7cd7e3536fff37a, EnableResetStreamAt: false} 2025/09/12 08:46:16 client -> Sending packet 0 (75 bytes) for connection 82fa59959e58b1f4e5b48950, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: 37a00d6f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:16 client Dropping Initial keys. 2025/09/12 08:46:16 client -> Sending packet 0 (42 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: 37a00d6f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:16 client <- Reading packet 2 (750 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 37a00d6f, PacketNumber: 2, PacketNumberLen: 2, Length: 737, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 08:46:16 client -> Sending packet 1 (36 bytes) for connection 82fa59959e58b1f4e5b48950, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: 37a00d6f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:16 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0af0c563, StatelessResetToken: 0x24b96feb7dff03cb425fb00d4112ae87} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebe3fa83, StatelessResetToken: 0x148d5534ff9d203c6cc2caf0814fd7c7} 2025/09/12 08:46:16 client <- &wire.NewTokenFrame{Token: 0x4a522750b68a4ade54a7e9845404ff76074fcf7fb5dfee60d1d47cd61c8ab81b953473a16d2bb17e92e3de9be1c5f469eb9ecbf93f7c06621c43546b8c981ac7b4a263c4aa0add6fe24e467563fb5b4b77337f428bcde3f49af644} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64f9366f, StatelessResetToken: 0xc44b6e7f29b15d8807ed592d963fe9d6} 2025/09/12 08:46:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:16 client Dropping Handshake keys. 2025/09/12 08:46:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:16 client -> Sending packet 1 (33 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 142.585µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64f9366f, StatelessResetToken: 0xc44b6e7f29b15d8807ed592d963fe9d6} 2025/09/12 08:46:16 client <- &wire.NewTokenFrame{Token: 0x4a522750b68a4ade54a7e9845404ff76074fcf7fb5dfee60d1d47cd61c8ab81b953473a16d2bb17e92e3de9be1c5f469eb9ecbf93f7c06621c43546b8c981ac7b4a263c4aa0add6fe24e467563fb5b4b77337f428bcde3f49af644} 2025/09/12 08:46:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0af0c563, StatelessResetToken: 0x24b96feb7dff03cb425fb00d4112ae87} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebe3fa83, StatelessResetToken: 0x148d5534ff9d203c6cc2caf0814fd7c7} 2025/09/12 08:46:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:16 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:16 client -> Sending packet 2 (32 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.315039ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:16 client -> Sending packet 4 (42 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:16 client Skipping packet number 3 2025/09/12 08:46:16 client -> Sending packet 5 (25 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client newly acked packets (1): [4] 2025/09/12 08:46:16 client updated RTT: 31.813ms (σ: 12.243ms) 2025/09/12 08:46:16 client ECN capability confirmed. 2025/09/12 08:46:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:16 client -> Sending packet 7 (25 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client -> Sending packet 8 (25 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client -> Sending packet 9 (1366 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.PingFrame{} 2025/09/12 08:46:16 client <- Reading packet 8 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0af0c563, StatelessResetToken: 0x24b96feb7dff03cb425fb00d4112ae87} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebe3fa83, StatelessResetToken: 0x148d5534ff9d203c6cc2caf0814fd7c7} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:16 client <- &wire.NewTokenFrame{Token: 0x4a522750b68a4ade54a7e9845404ff76074fcf7fb5dfee60d1d47cd61c8ab81b953473a16d2bb17e92e3de9be1c5f469eb9ecbf93f7c06621c43546b8c981ac7b4a263c4aa0add6fe24e467563fb5b4b77337f428bcde3f49af644} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64f9366f, StatelessResetToken: 0xc44b6e7f29b15d8807ed592d963fe9d6} 2025/09/12 08:46:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:16 client -> Sending packet 10 (35 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 134.651µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client <- Reading packet 10 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.PingFrame{} 2025/09/12 08:46:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:16 client -> Sending packet 11 (37 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 61.915µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client <- Reading packet 11 (31 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client <- Reading packet 12 (34 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 2.224ms, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client newly acked packets (1): [8] 2025/09/12 08:46:16 client lost packet 9 (time threshold) 2025/09/12 08:46:16 client Canceling loss detection timer. 2025/09/12 08:46:16 client <- Reading packet 16 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:16 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:16 client -> Sending packet 12 (39 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 2, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 142.706µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:16 client -> Sending packet 13 (26 bytes) for connection 82fa59959e58b1f4e5b48950, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: ebe3fa83, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:16 client Connection 82fa59959e58b1f4e5b48950 closed. 2025/09/12 08:46:16 Requesting https://server4:443/rxanxzzgcw. 2025/09/12 08:46:16 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:16 Increased send buffer size to 14336 kiB 2025/09/12 08:46:16 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:16 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:16 Created qlog file: /logs/qlog/416bdcd05c54943d5dcd1dc32f8bffa740.sqlog 2025/09/12 08:46:16 client Starting new connection to server4 ([::]:36702 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 416bdcd05c54943d5dcd1dc32f8bffa740, version v1 2025/09/12 08:46:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:16 client -> Sending packet 0 (1280 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 416bdcd05c54943d5dcd1dc32f8bffa740, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 08:46:16 client -> Sending packet 1 (1280 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 416bdcd05c54943d5dcd1dc32f8bffa740, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:16 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cca0a70, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:16 client Received first packet. Switching destination connection ID to: 1cca0a70 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 client newly acked packets (1): [0] 2025/09/12 08:46:16 client updated RTT: 32.098575ms (σ: 16.049287ms) 2025/09/12 08:46:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:16 client -> Sending packet 2 (1280 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 1cca0a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:16 client -> Sending packet 3 (1280 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 1cca0a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:16 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cca0a70, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client -> Sending packet 4 (1280 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: 1cca0a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 client Parsed a coalesced packet. Part 1: 758 bytes. Remaining: 91 bytes. 2025/09/12 08:46:16 client <- Reading packet 0 (758 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cca0a70, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/09/12 08:46:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 416bdcd05c54943d5dcd1dc32f8bffa740, InitialSourceConnectionID: 1cca0a70, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x891e954c6246d3de7e8c32b0cf5d0ef6, EnableResetStreamAt: false} 2025/09/12 08:46:16 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e353585e, StatelessResetToken: 0xca748fcb292fcd9660c7a1f97a0fc9e9} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d800de80, StatelessResetToken: 0x23fc9f6acb48998197cc8612d469e13d} 2025/09/12 08:46:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bea52e2d, StatelessResetToken: 0xa24100ce41d796625acb5d9b117cfe2f} 2025/09/12 08:46:16 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:16 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cca0a70, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:16 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:16 client newly acked packets (1): [3] 2025/09/12 08:46:16 client updated RTT: 32.388ms (σ: 12.618ms) 2025/09/12 08:46:16 client -> Sending packet 0 (119 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: d800de80, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:16 client Short Header{DestConnectionID: d800de80, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:16 client Dropping Initial keys. 2025/09/12 08:46:16 client -> Sending packet 1 (29 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: d800de80, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 528.172µs} 2025/09/12 08:46:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:16 client -> Sending packet 1 (70 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: d800de80, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:16 client -> Sending packet 2 (70 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: d800de80, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:16 client <- Reading packet 1 (758 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cca0a70, PacketNumber: 1, PacketNumberLen: 2, Length: 745, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/09/12 08:46:16 client -> Sending packet 3 (36 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: d800de80, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 client <- Reading packet 2 (758 bytes) for connection (empty), Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cca0a70, PacketNumber: 2, PacketNumberLen: 2, Length: 745, Version: v1} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/09/12 08:46:16 client -> Sending packet 4 (36 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, Handshake 2025/09/12 08:46:16 client Long Header{Type: Handshake, DestConnectionID: d800de80, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:16 client <- Reading packet 1 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:16 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:16 client Dropping Handshake keys. 2025/09/12 08:46:16 client <- &wire.NewTokenFrame{Token: 0x58654de5095d5cecb998c7b0bca7bd1adea2b609d015c28648b0efde1284d321995a8e19f957d830bcde7e6ce2faa599dad987920e04d23f5aae2011387c8227bfca73c2c9368adfa104df2a454c65224b6859b96de040d752d839} 2025/09/12 08:46:16 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:16 client -> Sending packet 3 (52 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: d800de80, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 123.701µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:16 client -> Sending packet 4 (44 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:16 client Short Header{DestConnectionID: d800de80, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:17 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:17 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:17 client -> Sending packet 5 (33 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: d800de80, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 61.565µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:17 client -> Sending packet 6 (26 bytes) for connection 416bdcd05c54943d5dcd1dc32f8bffa740, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: d800de80, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:17 client Connection 416bdcd05c54943d5dcd1dc32f8bffa740 closed. 2025/09/12 08:46:17 Requesting https://server4:443/zfmakrknri. 2025/09/12 08:46:17 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:17 Increased send buffer size to 14336 kiB 2025/09/12 08:46:17 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:17 Created qlog file: /logs/qlog/5d147adabbde8ea5d941291e61.sqlog 2025/09/12 08:46:17 client Starting new connection to server4 ([::]:34507 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5d147adabbde8ea5d941291e61, version v1 2025/09/12 08:46:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:17 client -> Sending packet 0 (1280 bytes) for connection 5d147adabbde8ea5d941291e61, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 5d147adabbde8ea5d941291e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 08:46:17 client -> Sending packet 1 (1280 bytes) for connection 5d147adabbde8ea5d941291e61, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 5d147adabbde8ea5d941291e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1235, Data length: 281, Offset + Data length: 1516} 2025/09/12 08:46:17 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fd36ce5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:17 client Received first packet. Switching destination connection ID to: 7fd36ce5 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:17 client newly acked packets (1): [0] 2025/09/12 08:46:17 client updated RTT: 31.91913ms (σ: 15.959565ms) 2025/09/12 08:46:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:17 client -> Sending packet 2 (1280 bytes) for connection 5d147adabbde8ea5d941291e61, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 7fd36ce5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1235, Data length: 281, Offset + Data length: 1516} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client -> Sending packet 3 (1280 bytes) for connection 5d147adabbde8ea5d941291e61, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 7fd36ce5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1235, Data length: 281, Offset + Data length: 1516} 2025/09/12 08:46:17 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fd36ce5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client -> Sending packet 4 (1280 bytes) for connection 5d147adabbde8ea5d941291e61, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 7fd36ce5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:17 client Parsed a coalesced packet. Part 1: 744 bytes. Remaining: 91 bytes. 2025/09/12 08:46:17 client <- Reading packet 0 (744 bytes) for connection (empty), Handshake 2025/09/12 08:46:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7fd36ce5, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 08:46:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5d147adabbde8ea5d941291e61, InitialSourceConnectionID: 7fd36ce5, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa1808647c8b49eecc600143ac4caa7ca, EnableResetStreamAt: false} 2025/09/12 08:46:17 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2a60aa86, StatelessResetToken: 0xfa847abc4faf2f078887093275a627e9} 2025/09/12 08:46:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6d64647a, StatelessResetToken: 0x8af7850735dbe2e66b7d45950632ee32} 2025/09/12 08:46:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7e2ce5f0, StatelessResetToken: 0x302e53d89459307dd97defab098c2117} 2025/09/12 08:46:17 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:17 client -> Sending packet 0 (100 bytes) for connection 5d147adabbde8ea5d941291e61, Handshake 2025/09/12 08:46:17 client Long Header{Type: Handshake, DestConnectionID: 6d64647a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:17 client Dropping Initial keys. 2025/09/12 08:46:17 client -> Sending packet 1 (28 bytes) for connection 5d147adabbde8ea5d941291e61, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 414.521µs} 2025/09/12 08:46:17 client -> Sending packet 2 (42 bytes) for connection 5d147adabbde8ea5d941291e61, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:17 client -> Sending packet 1 (70 bytes) for connection 5d147adabbde8ea5d941291e61, Handshake 2025/09/12 08:46:17 client Long Header{Type: Handshake, DestConnectionID: 6d64647a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:17 client -> Sending packet 2 (70 bytes) for connection 5d147adabbde8ea5d941291e61, Handshake 2025/09/12 08:46:17 client Long Header{Type: Handshake, DestConnectionID: 6d64647a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:17 client <- Reading packet 1 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.PingFrame{} 2025/09/12 08:46:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:17 client <- Reading packet 2 (286 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:17 client Dropping Handshake keys. 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:17 client <- &wire.NewTokenFrame{Token: 0x3f13a140384aa3551dc97b01c2494c77fcddaf21b9a7779a8e63f8df7185030c0a5056321360bbc5bf348cfcd5499405d2e08695cb342a134ae7a7fbfdf7a5473dda3ec2755e11da436c1d234e8f27edc966d824b404ca9987} 2025/09/12 08:46:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:17 client -> Sending packet 4 (33 bytes) for connection 5d147adabbde8ea5d941291e61, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 83.295µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:17 client Skipping packet number 3 2025/09/12 08:46:17 client -> Sending packet 5 (42 bytes) for connection 5d147adabbde8ea5d941291e61, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:17 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:17 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:17 client -> Sending packet 6 (33 bytes) for connection 5d147adabbde8ea5d941291e61, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 64.069µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:17 client -> Sending packet 7 (26 bytes) for connection 5d147adabbde8ea5d941291e61, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 6d64647a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:17 client Connection 5d147adabbde8ea5d941291e61 closed. 2025/09/12 08:46:17 Requesting https://server4:443/vdicbyrslb. 2025/09/12 08:46:17 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:17 Increased send buffer size to 14336 kiB 2025/09/12 08:46:17 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:17 Created qlog file: /logs/qlog/55e52831916de48fb82b23b0b5b754.sqlog 2025/09/12 08:46:17 client Starting new connection to server4 ([::]:45653 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 55e52831916de48fb82b23b0b5b754, version v1 2025/09/12 08:46:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:17 client -> Sending packet 0 (1280 bytes) for connection 55e52831916de48fb82b23b0b5b754, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 55e52831916de48fb82b23b0b5b754, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:17 client -> Sending packet 1 (1280 bytes) for connection 55e52831916de48fb82b23b0b5b754, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 55e52831916de48fb82b23b0b5b754, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1233, Data length: 283, Offset + Data length: 1516} 2025/09/12 08:46:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:17 client -> Sending packet 2 (1280 bytes) for connection 55e52831916de48fb82b23b0b5b754, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 55e52831916de48fb82b23b0b5b754, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:17 client -> Sending packet 3 (1280 bytes) for connection 55e52831916de48fb82b23b0b5b754, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 55e52831916de48fb82b23b0b5b754, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1233, Data length: 283, Offset + Data length: 1516} 2025/09/12 08:46:17 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: df2331ec, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client Received first packet. Switching destination connection ID to: df2331ec 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:17 client newly acked packets (1): [3] 2025/09/12 08:46:17 client updated RTT: 34.52575ms (σ: 17.262875ms) 2025/09/12 08:46:17 client setting loss timer for packet 2 (Initial) to 38.841468ms (in 2025-09-12 08:46:17.554469576 +0000 UTC m=+12.689758366) 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client -> Sending packet 4 (1280 bytes) for connection 55e52831916de48fb82b23b0b5b754, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: df2331ec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:17 client Parsed a coalesced packet. Part 1: 759 bytes. Remaining: 91 bytes. 2025/09/12 08:46:17 client <- Reading packet 0 (759 bytes) for connection (empty), Handshake 2025/09/12 08:46:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: df2331ec, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/09/12 08:46:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 55e52831916de48fb82b23b0b5b754, InitialSourceConnectionID: df2331ec, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x70ec7fe7c30292773311045fd6d22e14, EnableResetStreamAt: false} 2025/09/12 08:46:17 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: edf401ba, StatelessResetToken: 0xbfd9599d20fbc954600eb99147227a86} 2025/09/12 08:46:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7be09a3d, StatelessResetToken: 0xf5d60e853550cc4b026dd9c382fca499} 2025/09/12 08:46:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 62ffd4ce, StatelessResetToken: 0x5f33413cb09fc81eaf86a3384876276e} 2025/09/12 08:46:17 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:17 client -> Sending packet 0 (100 bytes) for connection 55e52831916de48fb82b23b0b5b754, Handshake 2025/09/12 08:46:17 client Long Header{Type: Handshake, DestConnectionID: 62ffd4ce, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:17 client Dropping Initial keys. 2025/09/12 08:46:17 client -> Sending packet 1 (48 bytes) for connection 55e52831916de48fb82b23b0b5b754, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560.332µs} 2025/09/12 08:46:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:17 client <- Reading packet 1 (293 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/09/12 08:46:17 client Peer doesn't await address validation any longer. 2025/09/12 08:46:17 client newly acked packets (1): [0] 2025/09/12 08:46:17 client updated RTT: 34.146ms (σ: 13.703ms) 2025/09/12 08:46:17 client Dropping Handshake keys. 2025/09/12 08:46:17 client <- &wire.NewTokenFrame{Token: 0x73c0bde510ccd718acc8ab5a957b0718843a45c52ee606be2c18f60fc40b93f7aa92decddf8b232d5c67051f5b102c80d1f7f101aaa7b78d257b8fcf98d836987af84e613800680b275887f38c4606f5d40468561ab220ca86ed34} 2025/09/12 08:46:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:17 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:17 client -> Sending packet 2 (32 bytes) for connection 55e52831916de48fb82b23b0b5b754, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.38005ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:17 client -> Sending packet 4 (42 bytes) for connection 55e52831916de48fb82b23b0b5b754, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:17 client -> Sending packet 5 (42 bytes) for connection 55e52831916de48fb82b23b0b5b754, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:17 client <- Reading packet 4 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:17 client <- &wire.NewTokenFrame{Token: 0x73c0bde510ccd718acc8ab5a957b0718843a45c52ee606be2c18f60fc40b93f7aa92decddf8b232d5c67051f5b102c80d1f7f101aaa7b78d257b8fcf98d836987af84e613800680b275887f38c4606f5d40468561ab220ca86ed34} 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:17 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:17 client -> Sending packet 6 (33 bytes) for connection 55e52831916de48fb82b23b0b5b754, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 76.352µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:17 client <- Reading packet 5 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:17 client newly acked packets (1): [5] 2025/09/12 08:46:17 client updated RTT: 33.729ms (σ: 11.109ms) 2025/09/12 08:46:17 client ECN capability confirmed. 2025/09/12 08:46:17 client Canceling loss detection timer. 2025/09/12 08:46:17 client <- Reading packet 6 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:17 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:17 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:17 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:17 client -> Sending packet 7 (26 bytes) for connection 55e52831916de48fb82b23b0b5b754, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:17 client Short Header{DestConnectionID: 62ffd4ce, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:17 client Connection 55e52831916de48fb82b23b0b5b754 closed. 2025/09/12 08:46:17 Requesting https://server4:443/xzmnuezhbw. 2025/09/12 08:46:17 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:17 Increased send buffer size to 14336 kiB 2025/09/12 08:46:17 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:17 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:17 Created qlog file: /logs/qlog/675807335cac45612da6.sqlog 2025/09/12 08:46:17 client Starting new connection to server4 ([::]:34188 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 675807335cac45612da6, version v1 2025/09/12 08:46:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:17 client -> Sending packet 0 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 675807335cac45612da6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:17 client -> Sending packet 1 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 675807335cac45612da6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15946107, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:17 client Received first packet. Switching destination connection ID to: 15946107 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:17 client newly acked packets (1): [0] 2025/09/12 08:46:17 client updated RTT: 31.976669ms (σ: 15.988334ms) 2025/09/12 08:46:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:17 client -> Sending packet 2 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 15946107, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client -> Sending packet 3 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 15946107, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 08:46:17 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:17 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15946107, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:17 client newly acked packets (1): [3] 2025/09/12 08:46:17 client updated RTT: 32.293ms (σ: 12.625ms) 2025/09/12 08:46:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:17 client -> Sending packet 4 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 15946107, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:17 client -> Sending packet 5 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:17 client Long Header{Type: Initial, DestConnectionID: 15946107, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:17 client -> &wire.PingFrame{} 2025/09/12 08:46:18 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15946107, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:18 client -> Sending packet 6 (1280 bytes) for connection 675807335cac45612da6, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 15946107, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:18 client <- Reading packet 1 (738 bytes) for connection (empty), Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 15946107, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 08:46:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 675807335cac45612da6, InitialSourceConnectionID: 15946107, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xba84b05cb70d4c41550b245ffd36c507, EnableResetStreamAt: false} 2025/09/12 08:46:18 client -> Sending packet 0 (75 bytes) for connection 675807335cac45612da6, Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: 15946107, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:18 client Dropping Initial keys. 2025/09/12 08:46:18 client <- Reading packet 2 (738 bytes) for connection (empty), Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 15946107, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 08:46:18 client -> Sending packet 1 (36 bytes) for connection 675807335cac45612da6, Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: 15946107, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:18 client -> Sending packet 0 (42 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 15946107, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:18 client <- Reading packet 2 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:18 client Dropping Handshake keys. 2025/09/12 08:46:18 client <- &wire.NewTokenFrame{Token: 0xdda6e749c7a4b580efddd3ec39fd32948b02026e374d5ca411506f15fbca545b49c80299339bf6d50f763bc14cb245967b1d15dc12cec07e048817f2e583b27e44e7f006a13e8e909c6f6458ae3f8e5de49daf865ec5724eac} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f32d8892, StatelessResetToken: 0x923cb0fbca59f8d0651a0863a3c10f38} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97a4c55f, StatelessResetToken: 0x039040c81b02bda3ee38f32564e4085a} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c344b8, StatelessResetToken: 0x9f9039d3c4caa5eb9fd64c65b10faebb} 2025/09/12 08:46:18 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:18 client -> Sending packet 1 (33 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 134.761µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:18 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.PingFrame{} 2025/09/12 08:46:18 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:18 client -> Sending packet 2 (33 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 61.956µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client newly acked packets (1): [1] 2025/09/12 08:46:18 client updated RTT: 32.098ms (σ: 9.858ms) 2025/09/12 08:46:18 client ECN capability confirmed. 2025/09/12 08:46:18 client lost packet 0 (time threshold) 2025/09/12 08:46:18 client Canceling loss detection timer. 2025/09/12 08:46:18 client Ignoring all packets below 3. 2025/09/12 08:46:18 client -> Sending packet 3 (42 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:18 client <- Reading packet 6 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c344b8, StatelessResetToken: 0x9f9039d3c4caa5eb9fd64c65b10faebb} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f32d8892, StatelessResetToken: 0x923cb0fbca59f8d0651a0863a3c10f38} 2025/09/12 08:46:18 client <- &wire.NewTokenFrame{Token: 0xdda6e749c7a4b580efddd3ec39fd32948b02026e374d5ca411506f15fbca545b49c80299339bf6d50f763bc14cb245967b1d15dc12cec07e048817f2e583b27e44e7f006a13e8e909c6f6458ae3f8e5de49daf865ec5724eac} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97a4c55f, StatelessResetToken: 0x039040c81b02bda3ee38f32564e4085a} 2025/09/12 08:46:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:18 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:18 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:18 client -> Sending packet 4 (32 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 25.320341ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:18 client -> Sending packet 6 (42 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:18 client -> Sending packet 7 (42 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:18 client <- Reading packet 7 (31 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 96µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client <- Reading packet 8 (1057 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 280µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client newly acked packets (1): [7] 2025/09/12 08:46:18 client updated RTT: 32.036ms (σ: 7.516ms) 2025/09/12 08:46:18 client Canceling loss detection timer. 2025/09/12 08:46:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:18 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:18 client -> Sending packet 8 (1366 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.PingFrame{} 2025/09/12 08:46:18 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:18 client -> Sending packet 9 (26 bytes) for connection 675807335cac45612da6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 92c344b8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:18 client Connection 675807335cac45612da6 closed. 2025/09/12 08:46:18 Requesting https://server4:443/ygdzircnxf. 2025/09/12 08:46:18 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:18 Increased send buffer size to 14336 kiB 2025/09/12 08:46:18 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:18 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:18 Created qlog file: /logs/qlog/e9b8e0f5aee2db81478c2d8f8057f3.sqlog 2025/09/12 08:46:18 client Starting new connection to server4 ([::]:38707 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e9b8e0f5aee2db81478c2d8f8057f3, version v1 2025/09/12 08:46:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:18 client -> Sending packet 0 (1280 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: e9b8e0f5aee2db81478c2d8f8057f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:18 client -> Sending packet 1 (1280 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: e9b8e0f5aee2db81478c2d8f8057f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 1233, Data length: 278, Offset + Data length: 1511} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:18 client -> Sending packet 2 (1280 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: e9b8e0f5aee2db81478c2d8f8057f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:18 client -> Sending packet 3 (1280 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: e9b8e0f5aee2db81478c2d8f8057f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 1233, Data length: 278, Offset + Data length: 1511} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:18 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 68b99936, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client Received first packet. Switching destination connection ID to: 68b99936 2025/09/12 08:46:18 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:18 client newly acked packets (2): [2 3] 2025/09/12 08:46:18 client updated RTT: 34.514009ms (σ: 17.257004ms) 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client -> Sending packet 4 (1280 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 68b99936, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:18 client Parsed a coalesced packet. Part 1: 759 bytes. Remaining: 91 bytes. 2025/09/12 08:46:18 client <- Reading packet 0 (759 bytes) for connection (empty), Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 68b99936, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/09/12 08:46:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e9b8e0f5aee2db81478c2d8f8057f3, InitialSourceConnectionID: 68b99936, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x145db4a80e8ef2d5a6bc123044e1fc9e, EnableResetStreamAt: false} 2025/09/12 08:46:18 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: beb6c41f, StatelessResetToken: 0x64d7e7b133ce848098e182aec3636181} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b625151, StatelessResetToken: 0x74a30971be9a94ea9749f2facd03b942} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 71b7fa6f, StatelessResetToken: 0xe907aa34983027154698b4911f3effa0} 2025/09/12 08:46:18 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:18 client -> Sending packet 0 (119 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: 71b7fa6f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:18 client Short Header{DestConnectionID: 71b7fa6f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:18 client Dropping Initial keys. 2025/09/12 08:46:18 client -> Sending packet 1 (28 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 71b7fa6f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 507.594µs} 2025/09/12 08:46:18 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:18 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:18 client -> Sending packet 2 (33 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 71b7fa6f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 71.793µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:18 client -> Sending packet 1 (61 bytes) for connection e9b8e0f5aee2db81478c2d8f8057f3, Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: 71b7fa6f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 08:46:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:18 client Short Header{DestConnectionID: 71b7fa6f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:18 client Connection e9b8e0f5aee2db81478c2d8f8057f3 closed. 2025/09/12 08:46:18 Requesting https://server4:443/tmkkqxqpbb. 2025/09/12 08:46:18 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:18 Increased send buffer size to 14336 kiB 2025/09/12 08:46:18 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:18 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:18 Created qlog file: /logs/qlog/293da524a101558bb37393a3521612eac5fd.sqlog 2025/09/12 08:46:18 client Starting new connection to server4 ([::]:41260 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 293da524a101558bb37393a3521612eac5fd, version v1 2025/09/12 08:46:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:18 client -> Sending packet 0 (1280 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 293da524a101558bb37393a3521612eac5fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:18 client -> Sending packet 1 (1280 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 293da524a101558bb37393a3521612eac5fd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 1230, Data length: 281, Offset + Data length: 1511} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:18 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2471e057, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:18 client Received first packet. Switching destination connection ID to: 2471e057 2025/09/12 08:46:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:18 client newly acked packets (1): [1] 2025/09/12 08:46:18 client updated RTT: 32.914011ms (σ: 16.457005ms) 2025/09/12 08:46:18 client setting loss timer for packet 0 (Initial) to 37.028262ms (in 2025-09-12 08:46:18.730747916 +0000 UTC m=+13.866036706) 2025/09/12 08:46:18 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 08:46:18.730747916 +0000 UTC m=+13.866036706 2025/09/12 08:46:18 client lost packet 0 (time threshold) 2025/09/12 08:46:18 client -> Sending packet 2 (1280 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 2471e057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:18 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2471e057, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:18 client newly acked packets (1): [2] 2025/09/12 08:46:18 client updated RTT: 32.982ms (σ: 12.479ms) 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client -> Sending packet 3 (1280 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 2471e057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:18 client -> Sending packet 4 (1280 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Initial 2025/09/12 08:46:18 client Long Header{Type: Initial, DestConnectionID: 2471e057, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:18 client -> &wire.PingFrame{} 2025/09/12 08:46:18 client <- Reading packet 1 (754 bytes) for connection (empty), Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2471e057, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 08:46:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 293da524a101558bb37393a3521612eac5fd, InitialSourceConnectionID: 2471e057, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xf00cd65263b4199225fe04cc8f08ea2a, EnableResetStreamAt: false} 2025/09/12 08:46:18 client -> Sending packet 0 (75 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: 2471e057, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:18 client Dropping Initial keys. 2025/09/12 08:46:18 client -> Sending packet 0 (42 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 2471e057, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:18 client <- Reading packet 2 (754 bytes) for connection (empty), Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2471e057, PacketNumber: 2, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 08:46:18 client -> Sending packet 1 (36 bytes) for connection 293da524a101558bb37393a3521612eac5fd, Handshake 2025/09/12 08:46:18 client Long Header{Type: Handshake, DestConnectionID: 2471e057, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:18 client Dropping %!s(logging.PacketType=0) packet (37 bytes) because we already dropped the keys. 2025/09/12 08:46:18 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f0a6e116, StatelessResetToken: 0x813d47d00db02025b0cc15b170c7fab0} 2025/09/12 08:46:18 client <- &wire.NewTokenFrame{Token: 0x000d7e941b3c36ffb36efa4a15ecc987b714678878173847b7e8a9d842f3e25ad7b1f6329335a8b56b5ba80e4ef6510f563a8254986746a2b5291de77271bb23438cd96970a647d5fd9c515001fd39af5218e43bb0430ce0e78531} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f8904c17, StatelessResetToken: 0x2a6adf0b69162c0d71b89579bb00e83b} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6ff09a36, StatelessResetToken: 0x81fff85a58bd4ce468c9900b6127d7ac} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:18 client Dropping Handshake keys. 2025/09/12 08:46:18 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:18 client -> Sending packet 1 (33 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 133.97µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:18 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:18 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:18 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:18 client <- &wire.NewTokenFrame{Token: 0x000d7e941b3c36ffb36efa4a15ecc987b714678878173847b7e8a9d842f3e25ad7b1f6329335a8b56b5ba80e4ef6510f563a8254986746a2b5291de77271bb23438cd96970a647d5fd9c515001fd39af5218e43bb0430ce0e78531} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6ff09a36, StatelessResetToken: 0x81fff85a58bd4ce468c9900b6127d7ac} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f0a6e116, StatelessResetToken: 0x813d47d00db02025b0cc15b170c7fab0} 2025/09/12 08:46:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f8904c17, StatelessResetToken: 0x2a6adf0b69162c0d71b89579bb00e83b} 2025/09/12 08:46:18 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:18 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:18 client -> Sending packet 2 (32 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:18 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:18 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.268632ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:19 client -> Sending packet 4 (42 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client Skipping packet number 3 2025/09/12 08:46:19 client -> Sending packet 5 (25 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:19 client <- Reading packet 5 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 104µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client newly acked packets (1): [5] 2025/09/12 08:46:19 client updated RTT: 32.727ms (σ: 9.868ms) 2025/09/12 08:46:19 client ECN capability confirmed. 2025/09/12 08:46:19 client setting loss timer for packet 4 (1-RTT) to 36.817875ms (in 2025-09-12 08:46:19.04209761 +0000 UTC m=+14.177386410) 2025/09/12 08:46:19 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 08:46:19.04209761 +0000 UTC m=+14.177386410 2025/09/12 08:46:19 client lost packet 4 (time threshold) 2025/09/12 08:46:19 client Canceling loss detection timer. 2025/09/12 08:46:19 client -> Sending packet 6 (42 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:19 client -> Sending packet 8 (42 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client -> Sending packet 9 (42 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client -> Sending packet 10 (1366 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.PingFrame{} 2025/09/12 08:46:19 client <- Reading packet 6 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.PingFrame{} 2025/09/12 08:46:19 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:19 client <- Reading packet 7 (31 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 232µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client newly acked packets (1): [9] 2025/09/12 08:46:19 client updated RTT: 32.638ms (σ: 7.578ms) 2025/09/12 08:46:19 client Canceling loss detection timer. 2025/09/12 08:46:19 client -> Sending packet 11 (33 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 155.81µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:19 client -> Sending packet 12 (26 bytes) for connection 293da524a101558bb37393a3521612eac5fd, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 6ff09a36, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:19 client Connection 293da524a101558bb37393a3521612eac5fd closed. 2025/09/12 08:46:19 Requesting https://server4:443/luhjywwblh. 2025/09/12 08:46:19 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:19 Increased send buffer size to 14336 kiB 2025/09/12 08:46:19 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:19 Created qlog file: /logs/qlog/08372932713372281123c7a90863572bc43d.sqlog 2025/09/12 08:46:19 client Starting new connection to server4 ([::]:46947 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 08372932713372281123c7a90863572bc43d, version v1 2025/09/12 08:46:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:19 client -> Sending packet 0 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 08372932713372281123c7a90863572bc43d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:19 client -> Sending packet 1 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 08372932713372281123c7a90863572bc43d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/09/12 08:46:19 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 586ef9d5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:19 client Received first packet. Switching destination connection ID to: 586ef9d5 2025/09/12 08:46:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:19 client newly acked packets (1): [0] 2025/09/12 08:46:19 client updated RTT: 31.942965ms (σ: 15.971482ms) 2025/09/12 08:46:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:19 client -> Sending packet 2 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:19 client -> Sending packet 3 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:19 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 586ef9d5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:19 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:19 client newly acked packets (1): [3] 2025/09/12 08:46:19 client updated RTT: 32.229ms (σ: 12.553ms) 2025/09/12 08:46:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:19 client -> Sending packet 4 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client -> &wire.PingFrame{} 2025/09/12 08:46:19 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 586ef9d5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:19 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:19 client newly acked packets (1): [4] 2025/09/12 08:46:19 client updated RTT: 32.19ms (σ: 9.491ms) 2025/09/12 08:46:19 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 586ef9d5, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:19 client -> Sending packet 5 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:19 client <- Reading packet 5 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 586ef9d5, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:19 client -> Sending packet 6 (1280 bytes) for connection 08372932713372281123c7a90863572bc43d, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:19 client <- Reading packet 2 (749 bytes) for connection (empty), Handshake 2025/09/12 08:46:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 586ef9d5, PacketNumber: 2, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 08:46:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 08:46:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 08372932713372281123c7a90863572bc43d, InitialSourceConnectionID: 586ef9d5, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8ae34c03059b9036ab619f6c87bed0cc, EnableResetStreamAt: false} 2025/09/12 08:46:19 client -> Sending packet 0 (75 bytes) for connection 08372932713372281123c7a90863572bc43d, Handshake 2025/09/12 08:46:19 client Long Header{Type: Handshake, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:19 client Dropping Initial keys. 2025/09/12 08:46:19 client -> Sending packet 0 (42 bytes) for connection 08372932713372281123c7a90863572bc43d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 586ef9d5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:19 client -> Sending packet 1 (70 bytes) for connection 08372932713372281123c7a90863572bc43d, Handshake 2025/09/12 08:46:19 client Long Header{Type: Handshake, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:19 client -> Sending packet 2 (70 bytes) for connection 08372932713372281123c7a90863572bc43d, Handshake 2025/09/12 08:46:19 client Long Header{Type: Handshake, DestConnectionID: 586ef9d5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:19 client <- Reading packet 2 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b194cf86, StatelessResetToken: 0x690b1319f06384f33d87cddb3a6811e5} 2025/09/12 08:46:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4aee67d7, StatelessResetToken: 0x30ff1b42a1bd2fb578c036122bd3b93a} 2025/09/12 08:46:19 client <- &wire.NewTokenFrame{Token: 0x56226b0e2be5324ecafc842ee6117b6b79d1e607a542e5b4c4c78a3bdd822fcf0589c93cf13c6e88ecf76b36b02be9d7986fa986a83bd1a528b3221e5e02a9fdee25a860a0f213f9295852960117d94a23a0365ba13733bd77} 2025/09/12 08:46:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d538007, StatelessResetToken: 0xb6e37027f4d19b4256f2da5f30115ebb} 2025/09/12 08:46:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:19 client Dropping Handshake keys. 2025/09/12 08:46:19 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:19 client -> Sending packet 2 (52 bytes) for connection 08372932713372281123c7a90863572bc43d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 4d538007, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 180.075µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client -> Sending packet 3 (44 bytes) for connection 08372932713372281123c7a90863572bc43d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 4d538007, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:19 client <- Reading packet 3 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b194cf86, StatelessResetToken: 0x690b1319f06384f33d87cddb3a6811e5} 2025/09/12 08:46:19 client <- &wire.NewTokenFrame{Token: 0x56226b0e2be5324ecafc842ee6117b6b79d1e607a542e5b4c4c78a3bdd822fcf0589c93cf13c6e88ecf76b36b02be9d7986fa986a83bd1a528b3221e5e02a9fdee25a860a0f213f9295852960117d94a23a0365ba13733bd77} 2025/09/12 08:46:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d538007, StatelessResetToken: 0xb6e37027f4d19b4256f2da5f30115ebb} 2025/09/12 08:46:19 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4aee67d7, StatelessResetToken: 0x30ff1b42a1bd2fb578c036122bd3b93a} 2025/09/12 08:46:19 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:19 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.PingFrame{} 2025/09/12 08:46:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:19 client -> Sending packet 4 (31 bytes) for connection 08372932713372281123c7a90863572bc43d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 4d538007, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 68.487µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 112µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client newly acked packets (1): [3] 2025/09/12 08:46:19 client updated RTT: 32.028ms (σ: 7.44ms) 2025/09/12 08:46:19 client ECN capability confirmed. 2025/09/12 08:46:19 client Canceling loss detection timer. 2025/09/12 08:46:19 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:19 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:19 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:19 client -> Sending packet 5 (33 bytes) for connection 08372932713372281123c7a90863572bc43d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 4d538007, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 2}}, DelayTime: 139.119µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:19 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:19 client -> Sending packet 6 (26 bytes) for connection 08372932713372281123c7a90863572bc43d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:19 client Short Header{DestConnectionID: 4d538007, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:19 client Connection 08372932713372281123c7a90863572bc43d closed. 2025/09/12 08:46:19 Requesting https://server4:443/izcqsxhmku. 2025/09/12 08:46:19 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:19 Increased send buffer size to 14336 kiB 2025/09/12 08:46:19 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:19 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:19 Created qlog file: /logs/qlog/59502ebb8a8694f9b086d1f965fddf.sqlog 2025/09/12 08:46:19 client Starting new connection to server4 ([::]:43562 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 59502ebb8a8694f9b086d1f965fddf, version v1 2025/09/12 08:46:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:19 client -> Sending packet 0 (1280 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 59502ebb8a8694f9b086d1f965fddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:19 client -> Sending packet 1 (1280 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, Initial 2025/09/12 08:46:19 client Long Header{Type: Initial, DestConnectionID: 59502ebb8a8694f9b086d1f965fddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 08:46:19 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:20 client -> Sending packet 2 (1280 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, Initial 2025/09/12 08:46:20 client Long Header{Type: Initial, DestConnectionID: 59502ebb8a8694f9b086d1f965fddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:20 client -> Sending packet 3 (1280 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, Initial 2025/09/12 08:46:20 client Long Header{Type: Initial, DestConnectionID: 59502ebb8a8694f9b086d1f965fddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:20 client -> &wire.CryptoFrame{Offset: 1233, Data length: 282, Offset + Data length: 1515} 2025/09/12 08:46:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:20 client Parsed a coalesced packet. Part 1: 750 bytes. Remaining: 91 bytes. 2025/09/12 08:46:20 client Queueing packet (750 bytes) for later decryption 2025/09/12 08:46:20 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:20 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 538ce369, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:20 client Received first packet. Switching destination connection ID to: 538ce369 2025/09/12 08:46:20 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:20 client newly acked packets (2): [2 3] 2025/09/12 08:46:20 client updated RTT: 34.392225ms (σ: 17.196112ms) 2025/09/12 08:46:20 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 538ce369, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:20 client -> Sending packet 4 (1280 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, Initial 2025/09/12 08:46:20 client Long Header{Type: Initial, DestConnectionID: 538ce369, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:20 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:20 client <- Reading packet 0 (750 bytes) for connection (empty), Handshake 2025/09/12 08:46:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 538ce369, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/09/12 08:46:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 08:46:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 59502ebb8a8694f9b086d1f965fddf, InitialSourceConnectionID: 538ce369, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x668df9fe350ff980efe005ada8d63b11, EnableResetStreamAt: false} 2025/09/12 08:46:20 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:20 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dba2b818, StatelessResetToken: 0xe229513d79250f3136a2d1ef2b199184} 2025/09/12 08:46:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0ed08e3b, StatelessResetToken: 0x6ef880bc1120b15b9a72bd8a35e37197} 2025/09/12 08:46:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: af27affc, StatelessResetToken: 0x52a64abc4b81fc7423a2f6363addf9d4} 2025/09/12 08:46:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:20 client -> Sending packet 0 (100 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, Handshake 2025/09/12 08:46:20 client Long Header{Type: Handshake, DestConnectionID: dba2b818, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:20 client Short Header{DestConnectionID: dba2b818, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:20 client Dropping Initial keys. 2025/09/12 08:46:20 client -> Sending packet 1 (31 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:20 client Short Header{DestConnectionID: dba2b818, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.441305ms} 2025/09/12 08:46:20 client -> Sending packet 2 (42 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:20 client Short Header{DestConnectionID: dba2b818, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:20 client <- Reading packet 1 (293 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/09/12 08:46:20 client Peer doesn't await address validation any longer. 2025/09/12 08:46:20 client newly acked packets (1): [0] 2025/09/12 08:46:20 client updated RTT: 34.099ms (σ: 13.481ms) 2025/09/12 08:46:20 client Dropping Handshake keys. 2025/09/12 08:46:20 client <- &wire.NewTokenFrame{Token: 0xbb0251bce5fb63bee9107b747e58ab98eb37a37b1e79ee0f30734456251bed19ba04ed962223ab3ae2260d66d7ad02570aaf785458cef9e7e674ec91d1b444913afb7c78e0b768af76405b8e266ebd82d6b4390e9a6b1d7bc11ab6} 2025/09/12 08:46:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:20 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:20 client -> Sending packet 3 (32 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:20 client Short Header{DestConnectionID: dba2b818, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.338565ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:20 client -> Sending packet 5 (42 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:20 client Short Header{DestConnectionID: dba2b818, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:20 client -> Sending packet 6 (42 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:20 client Short Header{DestConnectionID: dba2b818, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:20 client <- Reading packet 3 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:20 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:20 client newly acked packets (1): [6] 2025/09/12 08:46:20 client updated RTT: 33.714ms (σ: 10.88ms) 2025/09/12 08:46:20 client ECN capability confirmed. 2025/09/12 08:46:20 client Canceling loss detection timer. 2025/09/12 08:46:22 client <- Reading packet 8 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:22 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:22 client <- &wire.NewTokenFrame{Token: 0xbb0251bce5fb63bee9107b747e58ab98eb37a37b1e79ee0f30734456251bed19ba04ed962223ab3ae2260d66d7ad02570aaf785458cef9e7e674ec91d1b444913afb7c78e0b768af76405b8e266ebd82d6b4390e9a6b1d7bc11ab6} 2025/09/12 08:46:22 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:22 client -> Sending packet 7 (1366 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: dba2b818, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.PingFrame{} 2025/09/12 08:46:22 client -> Sending packet 8 (35 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: dba2b818, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 188.641µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:22 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:22 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:22 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:22 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:22 client -> Sending packet 9 (26 bytes) for connection 59502ebb8a8694f9b086d1f965fddf, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: dba2b818, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:22 client Connection 59502ebb8a8694f9b086d1f965fddf closed. 2025/09/12 08:46:22 Requesting https://server4:443/lihspdmuck. 2025/09/12 08:46:22 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:22 Increased send buffer size to 14336 kiB 2025/09/12 08:46:22 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:22 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:22 Created qlog file: /logs/qlog/fc71a8a065843b7847e8fb1b54.sqlog 2025/09/12 08:46:22 client Starting new connection to server4 ([::]:36735 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fc71a8a065843b7847e8fb1b54, version v1 2025/09/12 08:46:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:22 client -> Sending packet 0 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: fc71a8a065843b7847e8fb1b54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:22 client -> Sending packet 1 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: fc71a8a065843b7847e8fb1b54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/09/12 08:46:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:22 client -> Sending packet 2 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: fc71a8a065843b7847e8fb1b54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 08:46:22 client -> Sending packet 3 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: fc71a8a065843b7847e8fb1b54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:22 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:22 client Received first packet. Switching destination connection ID to: 3aa16dcb 2025/09/12 08:46:22 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:22 client newly acked packets (1): [2] 2025/09/12 08:46:22 client updated RTT: 32.384232ms (σ: 16.192116ms) 2025/09/12 08:46:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:22 client -> Sending packet 4 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 3aa16dcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/09/12 08:46:22 client -> Sending packet 5 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 3aa16dcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 1235, Data length: 274, Offset + Data length: 1509} 2025/09/12 08:46:22 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:22 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:22 client <- Reading packet 3 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:22 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:22 client newly acked packets (1): [5] 2025/09/12 08:46:22 client updated RTT: 32.446ms (σ: 12.268ms) 2025/09/12 08:46:22 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client -> Sending packet 6 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 3aa16dcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:22 client <- Reading packet 5 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:22 client -> Sending packet 7 (1280 bytes) for connection fc71a8a065843b7847e8fb1b54, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 3aa16dcb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:22 client <- Reading packet 1 (747 bytes) for connection (empty), Handshake 2025/09/12 08:46:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, PacketNumber: 1, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 08:46:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fc71a8a065843b7847e8fb1b54, InitialSourceConnectionID: 3aa16dcb, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x6a2f9c6f739168c91e556c3aaf6b3987, EnableResetStreamAt: false} 2025/09/12 08:46:22 client -> Sending packet 0 (75 bytes) for connection fc71a8a065843b7847e8fb1b54, Handshake 2025/09/12 08:46:22 client Long Header{Type: Handshake, DestConnectionID: 3aa16dcb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:22 client Dropping Initial keys. 2025/09/12 08:46:22 client <- Reading packet 2 (747 bytes) for connection (empty), Handshake 2025/09/12 08:46:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3aa16dcb, PacketNumber: 2, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 08:46:22 client -> Sending packet 1 (78 bytes) for connection fc71a8a065843b7847e8fb1b54, Handshake 2025/09/12 08:46:22 client Long Header{Type: Handshake, DestConnectionID: 3aa16dcb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:22 client Short Header{DestConnectionID: 3aa16dcb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:22 client <- Reading packet 2 (363 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/09/12 08:46:22 client Peer doesn't await address validation any longer. 2025/09/12 08:46:22 client newly acked packets (1): [0] 2025/09/12 08:46:22 client updated RTT: 32.323ms (σ: 9.446ms) 2025/09/12 08:46:22 client Canceling loss detection timer. 2025/09/12 08:46:22 client Dropping Handshake keys. 2025/09/12 08:46:22 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5fa453c3, StatelessResetToken: 0x2e5461c5f5880b0ee48254a7b45b3492} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 864b50e9, StatelessResetToken: 0xa36493e1e0201dedcbd42facbd24f56b} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dd5e329b, StatelessResetToken: 0xb9e4098c9a6344c4ab0c52a108c95f63} 2025/09/12 08:46:22 client <- &wire.NewTokenFrame{Token: 0xa2792a1ede57d8bdced74211bae2548faa76c5eb62b086c7b4e21680213a44faba3e5453bec11eb6306cb0ac646395283424f55a938890fe7bfeb13d036b9be40a85839aa93f104788523b62dc31eb38dc46d5e14d221a52fe} 2025/09/12 08:46:22 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:22 client -> Sending packet 1 (33 bytes) for connection fc71a8a065843b7847e8fb1b54, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: dd5e329b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 172.651µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:22 client <- Reading packet 3 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:22 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dd5e329b, StatelessResetToken: 0xb9e4098c9a6344c4ab0c52a108c95f63} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 864b50e9, StatelessResetToken: 0xa36493e1e0201dedcbd42facbd24f56b} 2025/09/12 08:46:22 client <- &wire.NewTokenFrame{Token: 0xa2792a1ede57d8bdced74211bae2548faa76c5eb62b086c7b4e21680213a44faba3e5453bec11eb6306cb0ac646395283424f55a938890fe7bfeb13d036b9be40a85839aa93f104788523b62dc31eb38dc46d5e14d221a52fe} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5fa453c3, StatelessResetToken: 0x2e5461c5f5880b0ee48254a7b45b3492} 2025/09/12 08:46:22 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:22 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:22 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:22 client -> Sending packet 2 (33 bytes) for connection fc71a8a065843b7847e8fb1b54, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: dd5e329b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 69.531µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:22 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:22 client -> Sending packet 3 (26 bytes) for connection fc71a8a065843b7847e8fb1b54, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: dd5e329b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:22 client Connection fc71a8a065843b7847e8fb1b54 closed. 2025/09/12 08:46:22 Requesting https://server4:443/mmbrrjrvsg. 2025/09/12 08:46:22 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:22 Increased send buffer size to 14336 kiB 2025/09/12 08:46:22 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:22 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:22 Created qlog file: /logs/qlog/7d78d2fcad5563bb1b.sqlog 2025/09/12 08:46:22 client Starting new connection to server4 ([::]:56014 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7d78d2fcad5563bb1b, version v1 2025/09/12 08:46:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:22 client -> Sending packet 0 (1280 bytes) for connection 7d78d2fcad5563bb1b, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 7d78d2fcad5563bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:22 client -> Sending packet 1 (1280 bytes) for connection 7d78d2fcad5563bb1b, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 7d78d2fcad5563bb1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 1239, Data length: 268, Offset + Data length: 1507} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:22 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75ec8517, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:22 client Received first packet. Switching destination connection ID to: 75ec8517 2025/09/12 08:46:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:22 client newly acked packets (1): [0] 2025/09/12 08:46:22 client updated RTT: 31.956897ms (σ: 15.978448ms) 2025/09/12 08:46:22 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 75ec8517, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:22 client newly acked packets (1): [1] 2025/09/12 08:46:22 client updated RTT: 32.245ms (σ: 12.561ms) 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client -> Sending packet 2 (1280 bytes) for connection 7d78d2fcad5563bb1b, Initial 2025/09/12 08:46:22 client Long Header{Type: Initial, DestConnectionID: 75ec8517, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:22 client Parsed a coalesced packet. Part 1: 741 bytes. Remaining: 91 bytes. 2025/09/12 08:46:22 client <- Reading packet 0 (741 bytes) for connection (empty), Handshake 2025/09/12 08:46:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 75ec8517, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/09/12 08:46:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 08:46:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7d78d2fcad5563bb1b, InitialSourceConnectionID: 75ec8517, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x75254605f372aca339d7b32431c27d33, EnableResetStreamAt: false} 2025/09/12 08:46:22 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:22 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef2e7708, StatelessResetToken: 0x73b77da76d0ce7cc09cbeb1fc2badefc} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cbfb96eb, StatelessResetToken: 0x169b52ad7de2517840a82eae18bcb013} 2025/09/12 08:46:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f15a0dde, StatelessResetToken: 0x37f81ff44e4dbaf6452eb7b0af410f14} 2025/09/12 08:46:22 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:22 client -> Sending packet 0 (119 bytes) for connection 7d78d2fcad5563bb1b, Handshake 2025/09/12 08:46:22 client Long Header{Type: Handshake, DestConnectionID: ef2e7708, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:22 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:22 client Dropping Initial keys. 2025/09/12 08:46:22 client -> Sending packet 1 (28 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:22 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 508.275µs} 2025/09/12 08:46:23 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 368µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client Peer doesn't await address validation any longer. 2025/09/12 08:46:23 client newly acked packets (1): [0] 2025/09/12 08:46:23 client Canceling loss detection timer. 2025/09/12 08:46:23 client Dropping Handshake keys. 2025/09/12 08:46:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:23 client <- &wire.NewTokenFrame{Token: 0xe0683d4658bd3d57c08401a9546ca409dc483432d76542422902c08842c0d954bc9a4c0e15384553a8c029104321be53e65a9aad1058a4eb2734fbbb063e73697aaa09e37b82aa325f3a14873ff42402fe96ed724b15d0c19fd76a} 2025/09/12 08:46:23 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:23 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:23 client -> Sending packet 2 (31 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 57.637µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:23 client <- Reading packet 7 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.PingFrame{} 2025/09/12 08:46:23 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:23 client -> Sending packet 3 (1366 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.PingFrame{} 2025/09/12 08:46:23 client -> Sending packet 4 (33 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 0}}, DelayTime: 163.945µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client <- Reading packet 8 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 104µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client newly acked packets (1): [3] 2025/09/12 08:46:23 client updated RTT: 32.213ms (σ: 9.483ms) 2025/09/12 08:46:23 client ECN capability confirmed. 2025/09/12 08:46:23 client <- Reading packet 11 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:23 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:23 client <- &wire.NewTokenFrame{Token: 0xe0683d4658bd3d57c08401a9546ca409dc483432d76542422902c08842c0d954bc9a4c0e15384553a8c029104321be53e65a9aad1058a4eb2734fbbb063e73697aaa09e37b82aa325f3a14873ff42402fe96ed724b15d0c19fd76a} 2025/09/12 08:46:23 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:23 client -> Sending packet 5 (1409 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.PingFrame{} 2025/09/12 08:46:23 client -> Sending packet 6 (35 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 0}}, DelayTime: 169.686µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client <- Reading packet 12 (1409 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.PingFrame{} 2025/09/12 08:46:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:23 client <- Reading packet 13 (1057 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 256µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client newly acked packets (1): [5] 2025/09/12 08:46:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:23 client -> Sending packet 7 (35 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 0}}, DelayTime: 102.36µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client <- Reading packet 14 (23 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 08:46:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:23 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:23 client -> Sending packet 8 (26 bytes) for connection 7d78d2fcad5563bb1b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: ef2e7708, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:23 client Connection 7d78d2fcad5563bb1b closed. 2025/09/12 08:46:23 Requesting https://server4:443/qduxngtdig. 2025/09/12 08:46:23 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:23 Increased send buffer size to 14336 kiB 2025/09/12 08:46:23 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:23 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:23 Created qlog file: /logs/qlog/a4c78ded03f6588d949c957ac8f9253304.sqlog 2025/09/12 08:46:23 client Starting new connection to server4 ([::]:38172 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a4c78ded03f6588d949c957ac8f9253304, version v1 2025/09/12 08:46:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:23 client -> Sending packet 0 (1280 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: a4c78ded03f6588d949c957ac8f9253304, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 08:46:23 client -> Sending packet 1 (1280 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: a4c78ded03f6588d949c957ac8f9253304, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 1231, Data length: 284, Offset + Data length: 1515} 2025/09/12 08:46:23 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4332b17b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:23 client Received first packet. Switching destination connection ID to: 4332b17b 2025/09/12 08:46:23 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:23 client newly acked packets (1): [1] 2025/09/12 08:46:23 client updated RTT: 32.984145ms (σ: 16.492072ms) 2025/09/12 08:46:23 client setting loss timer for packet 0 (Initial) to 37.107163ms (in 2025-09-12 08:46:23.520483552 +0000 UTC m=+18.655772352) 2025/09/12 08:46:23 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 08:46:23.520483552 +0000 UTC m=+18.655772352 2025/09/12 08:46:23 client lost packet 0 (time threshold) 2025/09/12 08:46:23 client -> Sending packet 2 (1280 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: 4332b17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:23 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4332b17b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:23 client newly acked packets (1): [2] 2025/09/12 08:46:23 client updated RTT: 33.064ms (σ: 12.53ms) 2025/09/12 08:46:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:23 client -> Sending packet 3 (1280 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: 4332b17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:23 client Parsed a coalesced packet. Part 1: 752 bytes. Remaining: 91 bytes. 2025/09/12 08:46:23 client <- Reading packet 0 (752 bytes) for connection (empty), Handshake 2025/09/12 08:46:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4332b17b, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/09/12 08:46:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/09/12 08:46:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a4c78ded03f6588d949c957ac8f9253304, InitialSourceConnectionID: 4332b17b, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x6693d0ecd0f05e27dc7d29f4ab480927, EnableResetStreamAt: false} 2025/09/12 08:46:23 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 78a94d5b, StatelessResetToken: 0xec99e323187a10cb29f8de475d09d0c7} 2025/09/12 08:46:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f55edf0d, StatelessResetToken: 0x80176f8260c96c1471669eb025b05d66} 2025/09/12 08:46:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0c5fb164, StatelessResetToken: 0x9f32a9974bfdb0696aa5cce191a980a4} 2025/09/12 08:46:23 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:23 client -> Sending packet 0 (119 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, Handshake 2025/09/12 08:46:23 client Long Header{Type: Handshake, DestConnectionID: 0c5fb164, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:23 client Short Header{DestConnectionID: 0c5fb164, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:23 client Dropping Initial keys. 2025/09/12 08:46:23 client -> Sending packet 1 (29 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: 0c5fb164, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584.407µs} 2025/09/12 08:46:23 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:23 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:23 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:23 client -> Sending packet 2 (33 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:23 client Short Header{DestConnectionID: 0c5fb164, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 103.753µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:23 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:23 client -> Sending packet 1 (61 bytes) for connection a4c78ded03f6588d949c957ac8f9253304, Handshake 2025/09/12 08:46:23 client Long Header{Type: Handshake, DestConnectionID: 0c5fb164, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 08:46:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:23 client Short Header{DestConnectionID: 0c5fb164, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:23 client Connection a4c78ded03f6588d949c957ac8f9253304 closed. 2025/09/12 08:46:23 Requesting https://server4:443/bistlrjtlp. 2025/09/12 08:46:23 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:23 Increased send buffer size to 14336 kiB 2025/09/12 08:46:23 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:23 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:23 Created qlog file: /logs/qlog/339075b48fae895a34892ede7597b1a5d26f3d43.sqlog 2025/09/12 08:46:23 client Starting new connection to server4 ([::]:50089 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 339075b48fae895a34892ede7597b1a5d26f3d43, version v1 2025/09/12 08:46:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:23 client -> Sending packet 0 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: 339075b48fae895a34892ede7597b1a5d26f3d43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 08:46:23 client -> Sending packet 1 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: 339075b48fae895a34892ede7597b1a5d26f3d43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 1228, Data length: 290, Offset + Data length: 1518} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:23 client -> Sending packet 2 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: 339075b48fae895a34892ede7597b1a5d26f3d43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 08:46:23 client -> Sending packet 3 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: 339075b48fae895a34892ede7597b1a5d26f3d43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 1228, Data length: 290, Offset + Data length: 1518} 2025/09/12 08:46:23 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad95bcc, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:23 client Received first packet. Switching destination connection ID to: dad95bcc 2025/09/12 08:46:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:23 client newly acked packets (1): [2] 2025/09/12 08:46:23 client updated RTT: 32.050158ms (σ: 16.025079ms) 2025/09/12 08:46:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:23 client -> Sending packet 4 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: dad95bcc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 1228, Data length: 290, Offset + Data length: 1518} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:23 client -> Sending packet 5 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:23 client Long Header{Type: Initial, DestConnectionID: dad95bcc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 1228, Data length: 290, Offset + Data length: 1518} 2025/09/12 08:46:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:24 client Queueing packet (753 bytes) for later decryption 2025/09/12 08:46:24 client Queueing packet (753 bytes) for later decryption 2025/09/12 08:46:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 08:46:24 client -> Sending packet 6 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: dad95bcc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 1228, Data length: 290, Offset + Data length: 1518} 2025/09/12 08:46:24 client -> Sending packet 7 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: dad95bcc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 1228, Data length: 290, Offset + Data length: 1518} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:24 client <- Reading packet 6 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad95bcc, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:24 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:24 client <- Reading packet 8 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad95bcc, Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:24 client -> Sending packet 8 (1280 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: dad95bcc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 08:46:24 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dad95bcc, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 339075b48fae895a34892ede7597b1a5d26f3d43, InitialSourceConnectionID: dad95bcc, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x91cb25cc0d9d3c12b02f8aaa9b1f0dca, EnableResetStreamAt: false} 2025/09/12 08:46:24 client <- Reading packet 2 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dad95bcc, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:24 client -> Sending packet 0 (75 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, Handshake 2025/09/12 08:46:24 client Long Header{Type: Handshake, DestConnectionID: dad95bcc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:24 client Dropping Initial keys. 2025/09/12 08:46:24 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/09/12 08:46:24 client -> Sending packet 0 (42 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:24 client Short Header{DestConnectionID: dad95bcc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:24 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:24 client Peer doesn't await address validation any longer. 2025/09/12 08:46:24 client newly acked packets (1): [0] 2025/09/12 08:46:24 client updated RTT: 32.023ms (σ: 12.071ms) 2025/09/12 08:46:24 client ECN capability confirmed. 2025/09/12 08:46:24 client Canceling loss detection timer. 2025/09/12 08:46:24 client Dropping Handshake keys. 2025/09/12 08:46:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:24 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:24 client <- &wire.NewTokenFrame{Token: 0x5a29d38c788f336fcbda09de269f2e68e79831d8141181b193bee4a5d2ddc1f36e1927b4b3b7cad2066133c6cb5bca10e49615d4ac1a55bf3dd060bc36e4822ab45f6bc6cdf4b80813f8e39fac35e73bcbb9029b4cf4e21442ee4b} 2025/09/12 08:46:24 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:24 client -> Sending packet 1 (31 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:24 client Short Header{DestConnectionID: dad95bcc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 150.81µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:24 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:24 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:24 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:24 client -> Sending packet 2 (26 bytes) for connection 339075b48fae895a34892ede7597b1a5d26f3d43, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:24 client Short Header{DestConnectionID: dad95bcc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:24 client Connection 339075b48fae895a34892ede7597b1a5d26f3d43 closed. 2025/09/12 08:46:24 Requesting https://server4:443/dhzlxxgdzd. 2025/09/12 08:46:24 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:24 Increased send buffer size to 14336 kiB 2025/09/12 08:46:24 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:24 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:24 Created qlog file: /logs/qlog/74bfe31acc5766bfcc6e407b.sqlog 2025/09/12 08:46:24 client Starting new connection to server4 ([::]:56776 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 74bfe31acc5766bfcc6e407b, version v1 2025/09/12 08:46:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:24 client -> Sending packet 0 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: 74bfe31acc5766bfcc6e407b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 08:46:24 client -> Sending packet 1 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: 74bfe31acc5766bfcc6e407b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:24 client -> &wire.CryptoFrame{Offset: 1236, Data length: 279, Offset + Data length: 1515} 2025/09/12 08:46:24 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f9af4115, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:24 client Received first packet. Switching destination connection ID to: f9af4115 2025/09/12 08:46:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:24 client newly acked packets (1): [0] 2025/09/12 08:46:24 client updated RTT: 32.016558ms (σ: 16.008279ms) 2025/09/12 08:46:24 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f9af4115, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:24 client newly acked packets (1): [1] 2025/09/12 08:46:24 client updated RTT: 32.303ms (σ: 12.581ms) 2025/09/12 08:46:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:24 client -> Sending packet 2 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: f9af4115, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:24 client -> Sending packet 3 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: f9af4115, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.PingFrame{} 2025/09/12 08:46:24 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f9af4115, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:24 client -> Sending packet 4 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: f9af4115, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:24 client -> Sending packet 5 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: f9af4115, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.PingFrame{} 2025/09/12 08:46:24 client -> Sending packet 6 (1280 bytes) for connection 74bfe31acc5766bfcc6e407b, Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: f9af4115, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:24 client -> &wire.PingFrame{} 2025/09/12 08:46:24 client <- Reading packet 5 (41 bytes) for connection (empty), Initial 2025/09/12 08:46:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f9af4115, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 08:46:24 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:24 client newly acked packets (1): [6] 2025/09/12 08:46:24 client updated RTT: 32.391ms (σ: 9.613ms) 2025/09/12 08:46:25 client <- Reading packet 1 (740 bytes) for connection (empty), Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f9af4115, PacketNumber: 1, PacketNumberLen: 2, Length: 727, Version: v1} 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/09/12 08:46:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 74bfe31acc5766bfcc6e407b, InitialSourceConnectionID: f9af4115, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xca425a0cd8a595477752277ef3a70a8c, EnableResetStreamAt: false} 2025/09/12 08:46:25 client -> Sending packet 0 (75 bytes) for connection 74bfe31acc5766bfcc6e407b, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: f9af4115, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:25 client Dropping Initial keys. 2025/09/12 08:46:25 client <- Reading packet 2 (740 bytes) for connection (empty), Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f9af4115, PacketNumber: 2, PacketNumberLen: 2, Length: 727, Version: v1} 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/09/12 08:46:25 client -> Sending packet 1 (36 bytes) for connection 74bfe31acc5766bfcc6e407b, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: f9af4115, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:25 client -> Sending packet 0 (42 bytes) for connection 74bfe31acc5766bfcc6e407b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: f9af4115, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:25 client -> Sending packet 2 (70 bytes) for connection 74bfe31acc5766bfcc6e407b, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: f9af4115, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:25 client -> Sending packet 3 (70 bytes) for connection 74bfe31acc5766bfcc6e407b, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: f9af4115, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:25 client <- Reading packet 3 (359 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 45676259, StatelessResetToken: 0xf637baafce110f023fe20cc4cf0c5fa0} 2025/09/12 08:46:25 client <- &wire.NewTokenFrame{Token: 0x4b16c7a2556c7c1743bc886181a8be9179ebfe1b6c35c7cd5b19b41e82a51a01d30734c1b4e789483880319fdb070dbb212ba1d6aefac8a1682fdc2981196b23d1840e50994f1dacc0cc6039833a8e2b23ee28a8cc1af66722bc} 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:25 client Dropping Handshake keys. 2025/09/12 08:46:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 14a4085c, StatelessResetToken: 0x1050b57d00c0629f314eb2b7111cd7c7} 2025/09/12 08:46:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb62bdee, StatelessResetToken: 0x737839448dd398b6af7d282837201028} 2025/09/12 08:46:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:25 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 72.048ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:25 client newly acked packets (1): [0] 2025/09/12 08:46:25 client updated RTT: 37.999ms (σ: 18.426ms) 2025/09/12 08:46:25 client ECN capability confirmed. 2025/09/12 08:46:25 client Canceling loss detection timer. 2025/09/12 08:46:25 client -> Sending packet 1 (33 bytes) for connection 74bfe31acc5766bfcc6e407b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 45676259, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 304.394µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:25 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:25 client -> Sending packet 2 (26 bytes) for connection 74bfe31acc5766bfcc6e407b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 45676259, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:25 client Connection 74bfe31acc5766bfcc6e407b closed. 2025/09/12 08:46:25 Requesting https://server4:443/arennsbbdo. 2025/09/12 08:46:25 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:25 Increased send buffer size to 14336 kiB 2025/09/12 08:46:25 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:25 Created qlog file: /logs/qlog/1ddc12d3661957414dc13ca20224.sqlog 2025/09/12 08:46:25 client Starting new connection to server4 ([::]:43503 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1ddc12d3661957414dc13ca20224, version v1 2025/09/12 08:46:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:25 client -> Sending packet 0 (1280 bytes) for connection 1ddc12d3661957414dc13ca20224, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: 1ddc12d3661957414dc13ca20224, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:25 client -> Sending packet 1 (1280 bytes) for connection 1ddc12d3661957414dc13ca20224, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: 1ddc12d3661957414dc13ca20224, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 1234, Data length: 270, Offset + Data length: 1504} 2025/09/12 08:46:25 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 209b637e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:25 client Received first packet. Switching destination connection ID to: 209b637e 2025/09/12 08:46:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:25 client newly acked packets (2): [0 1] 2025/09/12 08:46:25 client updated RTT: 34.298602ms (σ: 17.149301ms) 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:25 client -> Sending packet 2 (1280 bytes) for connection 1ddc12d3661957414dc13ca20224, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: 209b637e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:25 client -> Sending packet 3 (1280 bytes) for connection 1ddc12d3661957414dc13ca20224, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: 209b637e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:25 client -> &wire.PingFrame{} 2025/09/12 08:46:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:25 client -> Sending packet 4 (1280 bytes) for connection 1ddc12d3661957414dc13ca20224, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: 209b637e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:25 client -> &wire.PingFrame{} 2025/09/12 08:46:25 client -> Sending packet 5 (1280 bytes) for connection 1ddc12d3661957414dc13ca20224, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: 209b637e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:25 client -> &wire.PingFrame{} 2025/09/12 08:46:25 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 209b637e, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:25 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:25 client <- Reading packet 5 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 209b637e, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:25 client newly acked packets (1): [5] 2025/09/12 08:46:25 client updated RTT: 34.111ms (σ: 13.233ms) 2025/09/12 08:46:25 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 209b637e, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 08:46:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1ddc12d3661957414dc13ca20224, InitialSourceConnectionID: 209b637e, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xd70c278d05730b7ff7e95dbded1d77af, EnableResetStreamAt: false} 2025/09/12 08:46:25 client -> Sending packet 0 (75 bytes) for connection 1ddc12d3661957414dc13ca20224, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: 209b637e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:25 client Dropping Initial keys. 2025/09/12 08:46:25 client -> Sending packet 0 (42 bytes) for connection 1ddc12d3661957414dc13ca20224, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 209b637e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:25 client <- Reading packet 2 (749 bytes) for connection (empty), Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 209b637e, PacketNumber: 2, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 08:46:25 client -> Sending packet 1 (36 bytes) for connection 1ddc12d3661957414dc13ca20224, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: 209b637e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:25 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:25 client -> Sending packet 2 (70 bytes) for connection 1ddc12d3661957414dc13ca20224, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: 209b637e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:25 client -> Sending packet 3 (70 bytes) for connection 1ddc12d3661957414dc13ca20224, Handshake 2025/09/12 08:46:25 client Long Header{Type: Handshake, DestConnectionID: 209b637e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:25 client <- Reading packet 3 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3f401040, StatelessResetToken: 0xdf76cfe99816565e68796e0cdc276a8b} 2025/09/12 08:46:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c84428d, StatelessResetToken: 0x956205118c78c85c9d77ebf4dd1ab2a7} 2025/09/12 08:46:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 82a475c0, StatelessResetToken: 0xd14f91782dc6c9cb680d8000682b623a} 2025/09/12 08:46:25 client <- &wire.NewTokenFrame{Token: 0x90d953f073f98ebf479bf943598e56c007c97560124f3eeeb48fc9ae03ddbb6a22a460a8b651cbfd9dd52aecbf734bb4a08b219a1e5ff2701f6821d06c66c3464b57dacd52d78697a1adfaf5b8dc221f14b257b4c88c58f438} 2025/09/12 08:46:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:25 client Dropping Handshake keys. 2025/09/12 08:46:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:25 client -> Sending packet 2 (52 bytes) for connection 1ddc12d3661957414dc13ca20224, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 8c84428d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 172.481µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:25 client -> Sending packet 3 (44 bytes) for connection 1ddc12d3661957414dc13ca20224, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 8c84428d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:25 client <- Reading packet 5 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 87.92ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:25 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:25 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:25 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:25 client -> Sending packet 4 (35 bytes) for connection 1ddc12d3661957414dc13ca20224, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 8c84428d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 109.213µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:25 client -> Sending packet 5 (26 bytes) for connection 1ddc12d3661957414dc13ca20224, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:25 client Short Header{DestConnectionID: 8c84428d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:25 client Connection 1ddc12d3661957414dc13ca20224 closed. 2025/09/12 08:46:25 Requesting https://server4:443/weefqpaksv. 2025/09/12 08:46:25 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:25 Increased send buffer size to 14336 kiB 2025/09/12 08:46:25 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:25 Created qlog file: /logs/qlog/d6dd757dee2d5737254d.sqlog 2025/09/12 08:46:25 client Starting new connection to server4 ([::]:40527 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d6dd757dee2d5737254d, version v1 2025/09/12 08:46:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:25 client -> Sending packet 0 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: d6dd757dee2d5737254d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:25 client -> Sending packet 1 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:25 client Long Header{Type: Initial, DestConnectionID: d6dd757dee2d5737254d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:25 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 08:46:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:26 client -> Sending packet 2 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: d6dd757dee2d5737254d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:26 client -> Sending packet 3 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: d6dd757dee2d5737254d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 08:46:26 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8605162, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:26 client Received first packet. Switching destination connection ID to: f8605162 2025/09/12 08:46:26 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:26 client newly acked packets (1): [2] 2025/09/12 08:46:26 client updated RTT: 32.341239ms (σ: 16.170619ms) 2025/09/12 08:46:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:26 client -> Sending packet 4 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: f8605162, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 08:46:26 client -> Sending packet 5 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: f8605162, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 1238, Data length: 269, Offset + Data length: 1507} 2025/09/12 08:46:26 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8605162, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client -> Sending packet 6 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: f8605162, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:26 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8605162, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:26 client -> Sending packet 7 (1280 bytes) for connection d6dd757dee2d5737254d, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: f8605162, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:26 client <- Reading packet 1 (752 bytes) for connection (empty), Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8605162, PacketNumber: 1, PacketNumberLen: 2, Length: 739, Version: v1} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/09/12 08:46:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d6dd757dee2d5737254d, InitialSourceConnectionID: f8605162, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x38562d963ad4510ba844a845ee7411af, EnableResetStreamAt: false} 2025/09/12 08:46:26 client -> Sending packet 0 (75 bytes) for connection d6dd757dee2d5737254d, Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: f8605162, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:26 client Dropping Initial keys. 2025/09/12 08:46:26 client -> Sending packet 0 (42 bytes) for connection d6dd757dee2d5737254d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: f8605162, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:26 client <- Reading packet 2 (366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:26 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:26 client Peer doesn't await address validation any longer. 2025/09/12 08:46:26 client newly acked packets (1): [0] 2025/09/12 08:46:26 client updated RTT: 32.228ms (σ: 12.352ms) 2025/09/12 08:46:26 client ECN capability confirmed. 2025/09/12 08:46:26 client Canceling loss detection timer. 2025/09/12 08:46:26 client Dropping Handshake keys. 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f22c61e, StatelessResetToken: 0xd15c479146c5624e7a4a075d4ad473a6} 2025/09/12 08:46:26 client <- &wire.NewTokenFrame{Token: 0x946a0b199922303844bbfe1e8b78e87c2dfb601b372a922f0b9fd0dd3a210e5022ff7899bacbc9e428b2bd1af137c2963a2c31d4f90f85c7ac0a0cd183b1f452e871602a25c5d4fd13c8fec8650e0392206a09c52609044b63} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b3f67c57, StatelessResetToken: 0xfa9f2558fd043f808b91694e33ef1558} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:26 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0ada3c4a, StatelessResetToken: 0xdda4f5ddc0f9d34fc1c17594f526028f} 2025/09/12 08:46:26 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:26 client -> Sending packet 1 (33 bytes) for connection d6dd757dee2d5737254d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 0ada3c4a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 182.159µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:26 client <- Reading packet 3 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:26 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f22c61e, StatelessResetToken: 0xd15c479146c5624e7a4a075d4ad473a6} 2025/09/12 08:46:26 client <- &wire.NewTokenFrame{Token: 0x946a0b199922303844bbfe1e8b78e87c2dfb601b372a922f0b9fd0dd3a210e5022ff7899bacbc9e428b2bd1af137c2963a2c31d4f90f85c7ac0a0cd183b1f452e871602a25c5d4fd13c8fec8650e0392206a09c52609044b63} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:26 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b3f67c57, StatelessResetToken: 0xfa9f2558fd043f808b91694e33ef1558} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0ada3c4a, StatelessResetToken: 0xdda4f5ddc0f9d34fc1c17594f526028f} 2025/09/12 08:46:26 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 920, Offset + Data length: 920} 2025/09/12 08:46:26 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:26 client <- Reading packet 5 (127 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:26 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 920, Data length: 104, Offset + Data length: 1024} 2025/09/12 08:46:26 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:26 client -> Sending packet 2 (33 bytes) for connection d6dd757dee2d5737254d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 0ada3c4a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 58.69µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:26 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:26 client -> Sending packet 3 (26 bytes) for connection d6dd757dee2d5737254d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 0ada3c4a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:26 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:26 client Connection d6dd757dee2d5737254d closed. 2025/09/12 08:46:26 Requesting https://server4:443/jxcxmozlmk. 2025/09/12 08:46:26 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:26 Increased send buffer size to 14336 kiB 2025/09/12 08:46:26 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:26 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:26 Created qlog file: /logs/qlog/4d129954341bc74f31edf6960f0a270b.sqlog 2025/09/12 08:46:26 client Starting new connection to server4 ([::]:50060 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4d129954341bc74f31edf6960f0a270b, version v1 2025/09/12 08:46:26 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:26 client -> Sending packet 0 (1280 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: 4d129954341bc74f31edf6960f0a270b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 08:46:26 client -> Sending packet 1 (1280 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: 4d129954341bc74f31edf6960f0a270b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 1232, Data length: 285, Offset + Data length: 1517} 2025/09/12 08:46:26 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8aa784b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client Received first packet. Switching destination connection ID to: b8aa784b 2025/09/12 08:46:26 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:26 client newly acked packets (2): [0 1] 2025/09/12 08:46:26 client updated RTT: 34.246274ms (σ: 17.123137ms) 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client -> Sending packet 2 (1280 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: b8aa784b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:26 client Parsed a coalesced packet. Part 1: 754 bytes. Remaining: 91 bytes. 2025/09/12 08:46:26 client <- Reading packet 0 (754 bytes) for connection (empty), Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8aa784b, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 08:46:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4d129954341bc74f31edf6960f0a270b, InitialSourceConnectionID: b8aa784b, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xdfec87ae8f423d1ab40eb01374fc7179, EnableResetStreamAt: false} 2025/09/12 08:46:26 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:26 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 548db797, StatelessResetToken: 0x397a80712336e49f79bc65a4072f225f} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75540392, StatelessResetToken: 0x2a990cd7008f469231508dd48792eeed} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f9dc629, StatelessResetToken: 0x01227234587407fbf57b1dab77e40a1f} 2025/09/12 08:46:26 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:26 client -> Sending packet 0 (100 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: 548db797, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:26 client Dropping Initial keys. 2025/09/12 08:46:26 client -> Sending packet 1 (28 bytes) for connection 4d129954341bc74f31edf6960f0a270b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 411.786µs} 2025/09/12 08:46:26 client -> Sending packet 2 (42 bytes) for connection 4d129954341bc74f31edf6960f0a270b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:26 client <- Reading packet 1 (754 bytes) for connection (empty), Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8aa784b, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 08:46:26 client -> Sending packet 1 (36 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: 548db797, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:26 client -> Sending packet 2 (70 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: 548db797, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:26 client -> Sending packet 3 (70 bytes) for connection 4d129954341bc74f31edf6960f0a270b, Handshake 2025/09/12 08:46:26 client Long Header{Type: Handshake, DestConnectionID: 548db797, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:26 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:26 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:26 client Dropping Handshake keys. 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 548db797, StatelessResetToken: 0x397a80712336e49f79bc65a4072f225f} 2025/09/12 08:46:26 client <- &wire.NewTokenFrame{Token: 0x11775d8855230fd789acbd11320d0b028c68d5ae07c2a3646f269af060a36e5f475793d189a7aea92c4ce6ee7c8a9cb11294996fd82addf2c5fe2c09c14dc6f6d26de089c523b6649632dee29b8660fb3d8268275f613e74ebdb78} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75540392, StatelessResetToken: 0x2a990cd7008f469231508dd48792eeed} 2025/09/12 08:46:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f9dc629, StatelessResetToken: 0x01227234587407fbf57b1dab77e40a1f} 2025/09/12 08:46:26 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:26 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:26 client -> Sending packet 4 (35 bytes) for connection 4d129954341bc74f31edf6960f0a270b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 112.69µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:26 client Skipping packet number 3 2025/09/12 08:46:26 client -> Sending packet 5 (42 bytes) for connection 4d129954341bc74f31edf6960f0a270b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:26 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:26 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:26 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:26 client -> Sending packet 6 (35 bytes) for connection 4d129954341bc74f31edf6960f0a270b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 67.436µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:26 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:26 client -> Sending packet 7 (26 bytes) for connection 4d129954341bc74f31edf6960f0a270b, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:26 client Short Header{DestConnectionID: 548db797, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:26 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:26 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:26 client Connection 4d129954341bc74f31edf6960f0a270b closed. 2025/09/12 08:46:26 Requesting https://server4:443/qfyjzolziw. 2025/09/12 08:46:26 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:26 Increased send buffer size to 14336 kiB 2025/09/12 08:46:26 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:26 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:26 Created qlog file: /logs/qlog/67ff1d3486bffe479edcb8.sqlog 2025/09/12 08:46:26 client Starting new connection to server4 ([::]:52888 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 67ff1d3486bffe479edcb8, version v1 2025/09/12 08:46:26 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:26 client -> Sending packet 0 (1280 bytes) for connection 67ff1d3486bffe479edcb8, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: 67ff1d3486bffe479edcb8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:26 client -> Sending packet 1 (1280 bytes) for connection 67ff1d3486bffe479edcb8, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: 67ff1d3486bffe479edcb8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 1237, Data length: 271, Offset + Data length: 1508} 2025/09/12 08:46:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:26 client -> Sending packet 2 (1280 bytes) for connection 67ff1d3486bffe479edcb8, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: 67ff1d3486bffe479edcb8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:26 client -> Sending packet 3 (1280 bytes) for connection 67ff1d3486bffe479edcb8, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: 67ff1d3486bffe479edcb8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 1237, Data length: 271, Offset + Data length: 1508} 2025/09/12 08:46:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:26 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8b22d6d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client Received first packet. Switching destination connection ID to: a8b22d6d 2025/09/12 08:46:26 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:26 client newly acked packets (1): [2] 2025/09/12 08:46:26 client updated RTT: 33.690129ms (σ: 16.845064ms) 2025/09/12 08:46:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:26 client -> Sending packet 4 (1280 bytes) for connection 67ff1d3486bffe479edcb8, Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: a8b22d6d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:26 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8b22d6d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:26 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:26 client newly acked packets (1): [3] 2025/09/12 08:46:26 client updated RTT: 33.778ms (σ: 12.81ms) 2025/09/12 08:46:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:27 client <- Reading packet 1 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8b22d6d, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 67ff1d3486bffe479edcb8, InitialSourceConnectionID: a8b22d6d, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xa9aa45a7e4ebfec4d76405c3a491d27c, EnableResetStreamAt: false} 2025/09/12 08:46:27 client -> Sending packet 0 (75 bytes) for connection 67ff1d3486bffe479edcb8, Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: a8b22d6d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:27 client Dropping Initial keys. 2025/09/12 08:46:27 client -> Sending packet 0 (42 bytes) for connection 67ff1d3486bffe479edcb8, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: a8b22d6d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:27 client <- Reading packet 2 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8b22d6d, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:27 client -> Sending packet 1 (36 bytes) for connection 67ff1d3486bffe479edcb8, Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: a8b22d6d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:27 client -> Sending packet 2 (70 bytes) for connection 67ff1d3486bffe479edcb8, Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: a8b22d6d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:27 client -> Sending packet 3 (70 bytes) for connection 67ff1d3486bffe479edcb8, Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: a8b22d6d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:27 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a11df2fb, StatelessResetToken: 0x20f8f848707a5e88133331a3f346d90f} 2025/09/12 08:46:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bc36cc32, StatelessResetToken: 0x95c70fa06dc06577d037e49de7dd7127} 2025/09/12 08:46:27 client <- &wire.NewTokenFrame{Token: 0xf5243acf5a5685df6393187c5af99a660b223addac531801de5a3f4c9cef2f4b296d4b8a537e4b4dc1b0a0b7b524712055a86d0ae4a4317f52cdd87a3f3cd5f3355d48795fbaab8549e9d57cafc406e1403ee777918290ba57339f} 2025/09/12 08:46:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: aa853431, StatelessResetToken: 0x1143104de9e943a5a5dc4e99ddb8c718} 2025/09/12 08:46:27 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:27 client Dropping Handshake keys. 2025/09/12 08:46:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:27 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:27 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 85.944ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:27 client newly acked packets (1): [0] 2025/09/12 08:46:27 client updated RTT: 40.94ms (σ: 23.931ms) 2025/09/12 08:46:27 client ECN capability confirmed. 2025/09/12 08:46:27 client Canceling loss detection timer. 2025/09/12 08:46:27 client -> Sending packet 1 (33 bytes) for connection 67ff1d3486bffe479edcb8, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: aa853431, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 193.24µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:27 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:27 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:27 client -> Sending packet 2 (26 bytes) for connection 67ff1d3486bffe479edcb8, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: aa853431, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:27 client Connection 67ff1d3486bffe479edcb8 closed. 2025/09/12 08:46:27 Requesting https://server4:443/wdnyiwfwad. 2025/09/12 08:46:27 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:27 Increased send buffer size to 14336 kiB 2025/09/12 08:46:27 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:27 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:27 Created qlog file: /logs/qlog/c19b96a0e9668c3e91f6.sqlog 2025/09/12 08:46:27 client Starting new connection to server4 ([::]:38931 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c19b96a0e9668c3e91f6, version v1 2025/09/12 08:46:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:27 client -> Sending packet 0 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: c19b96a0e9668c3e91f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:27 client -> Sending packet 1 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: c19b96a0e9668c3e91f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 08:46:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:27 client -> Sending packet 2 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: c19b96a0e9668c3e91f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:27 client -> Sending packet 3 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: c19b96a0e9668c3e91f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:27 client -> Sending packet 4 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: c19b96a0e9668c3e91f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:27 client -> Sending packet 5 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: c19b96a0e9668c3e91f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:27 client <- Reading packet 1 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b685343, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:27 client Received first packet. Switching destination connection ID to: 9b685343 2025/09/12 08:46:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:27 client newly acked packets (1): [4] 2025/09/12 08:46:27 client updated RTT: 32.025878ms (σ: 16.012939ms) 2025/09/12 08:46:27 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b685343, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:27 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:27 client newly acked packets (1): [5] 2025/09/12 08:46:27 client updated RTT: 32.346ms (σ: 12.652ms) 2025/09/12 08:46:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:27 client -> Sending packet 6 (1280 bytes) for connection c19b96a0e9668c3e91f6, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: 9b685343, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:27 client Parsed a coalesced packet. Part 1: 747 bytes. Remaining: 91 bytes. 2025/09/12 08:46:27 client <- Reading packet 0 (747 bytes) for connection (empty), Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b685343, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 08:46:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 08:46:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c19b96a0e9668c3e91f6, InitialSourceConnectionID: 9b685343, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xe19c7205e01b6c99563800b1dc3bccc9, EnableResetStreamAt: false} 2025/09/12 08:46:27 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 64b92b73, StatelessResetToken: 0x8cc340c7a29e891225d664e2b57bfedb} 2025/09/12 08:46:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2e8fe010, StatelessResetToken: 0x9a2e044308ffaccaedc300d419d08666} 2025/09/12 08:46:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00b6a293, StatelessResetToken: 0x133bceed4debfc2fa3c5e6ef5a8132c2} 2025/09/12 08:46:27 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:27 client -> Sending packet 0 (100 bytes) for connection c19b96a0e9668c3e91f6, Handshake 2025/09/12 08:46:27 client Long Header{Type: Handshake, DestConnectionID: 00b6a293, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:27 client Short Header{DestConnectionID: 00b6a293, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:27 client Dropping Initial keys. 2025/09/12 08:46:27 client -> Sending packet 1 (47 bytes) for connection c19b96a0e9668c3e91f6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: 00b6a293, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 443.275µs} 2025/09/12 08:46:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:27 client <- Reading packet 1 (293 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360µs} 2025/09/12 08:46:27 client Peer doesn't await address validation any longer. 2025/09/12 08:46:27 client newly acked packets (1): [0] 2025/09/12 08:46:27 client updated RTT: 32.274ms (σ: 9.632ms) 2025/09/12 08:46:27 client Dropping Handshake keys. 2025/09/12 08:46:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:27 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:27 client <- &wire.NewTokenFrame{Token: 0x6aa0f2f9c5e3a6eaadde804e1e7c9be482163fbd32a9d502de71db6f7d15f781e266004f02b20787c395c8ff6b4e68d80b76b7dd38550058b45e7ec11794194dc0765ea10f8384bba75f87c5bb318bf965d76dbf62b0fe7eaae97c} 2025/09/12 08:46:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:27 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:27 client -> Sending packet 2 (32 bytes) for connection c19b96a0e9668c3e91f6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: 00b6a293, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.419029ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:27 client -> Sending packet 4 (42 bytes) for connection c19b96a0e9668c3e91f6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: 00b6a293, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:27 client -> Sending packet 5 (42 bytes) for connection c19b96a0e9668c3e91f6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: 00b6a293, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:27 client <- Reading packet 2 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:27 client newly acked packets (1): [5] 2025/09/12 08:46:27 client updated RTT: 32.125ms (σ: 7.52ms) 2025/09/12 08:46:27 client ECN capability confirmed. 2025/09/12 08:46:27 client Canceling loss detection timer. 2025/09/12 08:46:27 client <- Reading packet 3 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:27 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:27 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:27 client -> Sending packet 6 (26 bytes) for connection c19b96a0e9668c3e91f6, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:27 client Short Header{DestConnectionID: 00b6a293, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:27 client Connection c19b96a0e9668c3e91f6 closed. 2025/09/12 08:46:27 Requesting https://server4:443/ayztcdogou. 2025/09/12 08:46:27 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:27 Increased send buffer size to 14336 kiB 2025/09/12 08:46:27 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:27 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:27 Created qlog file: /logs/qlog/f6d81fb98d3c9f3c8355a38d.sqlog 2025/09/12 08:46:27 client Starting new connection to server4 ([::]:59836 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f6d81fb98d3c9f3c8355a38d, version v1 2025/09/12 08:46:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:27 client -> Sending packet 0 (1280 bytes) for connection f6d81fb98d3c9f3c8355a38d, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: f6d81fb98d3c9f3c8355a38d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 08:46:27 client -> Sending packet 1 (1280 bytes) for connection f6d81fb98d3c9f3c8355a38d, Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: f6d81fb98d3c9f3c8355a38d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:27 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 08:46:27 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 368a200c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:27 client Received first packet. Switching destination connection ID to: 368a200c 2025/09/12 08:46:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:27 client newly acked packets (1): [0] 2025/09/12 08:46:27 client updated RTT: 32.050384ms (σ: 16.025192ms) 2025/09/12 08:46:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:28 client -> Sending packet 2 (1280 bytes) for connection f6d81fb98d3c9f3c8355a38d, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 368a200c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:28 client -> Sending packet 3 (1280 bytes) for connection f6d81fb98d3c9f3c8355a38d, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 368a200c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:28 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 368a200c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:28 client newly acked packets (1): [3] 2025/09/12 08:46:28 client updated RTT: 32.354ms (σ: 12.628ms) 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client -> Sending packet 4 (1280 bytes) for connection f6d81fb98d3c9f3c8355a38d, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 368a200c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:28 client <- Reading packet 1 (743 bytes) for connection (empty), Handshake 2025/09/12 08:46:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 368a200c, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/12 08:46:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f6d81fb98d3c9f3c8355a38d, InitialSourceConnectionID: 368a200c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x75a6cec29e79911fd3f4d1a120580819, EnableResetStreamAt: false} 2025/09/12 08:46:28 client -> Sending packet 0 (75 bytes) for connection f6d81fb98d3c9f3c8355a38d, Handshake 2025/09/12 08:46:28 client Long Header{Type: Handshake, DestConnectionID: 368a200c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:28 client Dropping Initial keys. 2025/09/12 08:46:28 client <- Reading packet 2 (743 bytes) for connection (empty), Handshake 2025/09/12 08:46:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 368a200c, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/12 08:46:28 client -> Sending packet 1 (78 bytes) for connection f6d81fb98d3c9f3c8355a38d, Handshake 2025/09/12 08:46:28 client Long Header{Type: Handshake, DestConnectionID: 368a200c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:28 client Short Header{DestConnectionID: 368a200c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:28 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.NewTokenFrame{Token: 0x08e060c8b6af4f97a4a4649a014d2c30f2c623ba36a77fbe31fe4e4676f9fdce970265a1a8dec115023422e5ef2e5dc36cb1dadd4c84f558b303de49a7e647de72b31a84ab87da43782a11d3813491335a88309304990114d80252} 2025/09/12 08:46:28 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:28 client Dropping Handshake keys. 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bc8c95eb, StatelessResetToken: 0x44f01d394a3fc3cb62592b36d67f76c0} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d0d20faf, StatelessResetToken: 0x6ebe40ba6ed32e83d786c79feaae1863} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 60c96f01, StatelessResetToken: 0xf3f6aabe1d77745467f48baeeab08de3} 2025/09/12 08:46:28 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:28 client -> Sending packet 1 (33 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 148.086µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:28 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:28 client <- &wire.NewTokenFrame{Token: 0x08e060c8b6af4f97a4a4649a014d2c30f2c623ba36a77fbe31fe4e4676f9fdce970265a1a8dec115023422e5ef2e5dc36cb1dadd4c84f558b303de49a7e647de72b31a84ab87da43782a11d3813491335a88309304990114d80252} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 60c96f01, StatelessResetToken: 0xf3f6aabe1d77745467f48baeeab08de3} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bc8c95eb, StatelessResetToken: 0x44f01d394a3fc3cb62592b36d67f76c0} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d0d20faf, StatelessResetToken: 0x6ebe40ba6ed32e83d786c79feaae1863} 2025/09/12 08:46:28 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:28 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:28 client -> Sending packet 2 (32 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.240109ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:28 client -> Sending packet 4 (42 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:28 client Skipping packet number 3 2025/09/12 08:46:28 client -> Sending packet 5 (25 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:28 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 08:46:28 client -> Sending packet 7 (42 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:28 client Skipping packet number 6 2025/09/12 08:46:28 client -> Sending packet 8 (25 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:28 client -> Sending packet 9 (1366 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.PingFrame{} 2025/09/12 08:46:28 client <- Reading packet 7 (31 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client newly acked packets (1): [7] 2025/09/12 08:46:28 client updated RTT: 32.182ms (σ: 9.813ms) 2025/09/12 08:46:28 client ECN capability confirmed. 2025/09/12 08:46:28 client <- Reading packet 9 (33 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 64µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client newly acked packets (1): [9] 2025/09/12 08:46:28 client updated RTT: 32.152ms (σ: 7.419ms) 2025/09/12 08:46:28 client setting loss timer for packet 8 (1-RTT) to 36.171ms (in 2025-09-12 08:46:28.567818008 +0000 UTC m=+23.703106798) 2025/09/12 08:46:28 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 08:46:28.567818008 +0000 UTC m=+23.703106798 2025/09/12 08:46:28 client lost packet 8 (time threshold) 2025/09/12 08:46:28 client Canceling loss detection timer. 2025/09/12 08:46:28 client -> Sending packet 10 (25 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:28 client <- Reading packet 10 (34 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 25.344ms, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client newly acked packets (1): [10] 2025/09/12 08:46:28 client updated RTT: 35.154ms (σ: 11.569ms) 2025/09/12 08:46:28 client Canceling loss detection timer. 2025/09/12 08:46:28 client <- Reading packet 12 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:28 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:28 client -> Sending packet 11 (37 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 112.84µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:28 client -> Sending packet 12 (26 bytes) for connection f6d81fb98d3c9f3c8355a38d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: d0d20faf, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:28 client Connection f6d81fb98d3c9f3c8355a38d closed. 2025/09/12 08:46:28 Requesting https://server4:443/jejzxuixet. 2025/09/12 08:46:28 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:28 Increased send buffer size to 14336 kiB 2025/09/12 08:46:28 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:28 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:28 Created qlog file: /logs/qlog/a9486e2b337e55ce7a92b2422aee36.sqlog 2025/09/12 08:46:28 client Starting new connection to server4 ([::]:54598 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9486e2b337e55ce7a92b2422aee36, version v1 2025/09/12 08:46:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:28 client -> Sending packet 0 (1280 bytes) for connection a9486e2b337e55ce7a92b2422aee36, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: a9486e2b337e55ce7a92b2422aee36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:28 client -> Sending packet 1 (1280 bytes) for connection a9486e2b337e55ce7a92b2422aee36, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: a9486e2b337e55ce7a92b2422aee36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 1233, Data length: 273, Offset + Data length: 1506} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:28 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e5c640c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:28 client Received first packet. Switching destination connection ID to: 2e5c640c 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:28 client newly acked packets (1): [0] 2025/09/12 08:46:28 client updated RTT: 31.976614ms (σ: 15.988307ms) 2025/09/12 08:46:28 client Parsed a coalesced packet. Part 1: 743 bytes. Remaining: 91 bytes. 2025/09/12 08:46:28 client Queueing packet (743 bytes) for later decryption 2025/09/12 08:46:28 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:28 client -> Sending packet 2 (1280 bytes) for connection a9486e2b337e55ce7a92b2422aee36, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 2e5c640c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 1233, Data length: 273, Offset + Data length: 1506} 2025/09/12 08:46:28 client -> Sending packet 3 (1280 bytes) for connection a9486e2b337e55ce7a92b2422aee36, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 2e5c640c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 1233, Data length: 273, Offset + Data length: 1506} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:28 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e5c640c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:28 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e5c640c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client -> Sending packet 4 (1280 bytes) for connection a9486e2b337e55ce7a92b2422aee36, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 2e5c640c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:28 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/09/12 08:46:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e5c640c, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/12 08:46:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9486e2b337e55ce7a92b2422aee36, InitialSourceConnectionID: 2e5c640c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x8cb365c85d8cb8f0eaadb77224c6fd82, EnableResetStreamAt: false} 2025/09/12 08:46:28 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 88c2cdfc, StatelessResetToken: 0x0656a82c07be0a3e4a6bb6c6b7808dda} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0c7b4482, StatelessResetToken: 0x079ff6c8a47e9362b556f013a7ad50b0} 2025/09/12 08:46:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ac9cc2a, StatelessResetToken: 0x8582e9c894ab2125b081212e133627a7} 2025/09/12 08:46:28 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:28 client -> Sending packet 0 (100 bytes) for connection a9486e2b337e55ce7a92b2422aee36, Handshake 2025/09/12 08:46:28 client Long Header{Type: Handshake, DestConnectionID: 88c2cdfc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:28 client Short Header{DestConnectionID: 88c2cdfc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:28 client Dropping Initial keys. 2025/09/12 08:46:28 client -> Sending packet 1 (31 bytes) for connection a9486e2b337e55ce7a92b2422aee36, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: 88c2cdfc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.649461ms} 2025/09/12 08:46:28 client -> Sending packet 2 (42 bytes) for connection a9486e2b337e55ce7a92b2422aee36, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: 88c2cdfc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:28 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/09/12 08:46:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:28 client <- Reading packet 1 (298 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 288µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client Peer doesn't await address validation any longer. 2025/09/12 08:46:28 client newly acked packets (2): [0 2] 2025/09/12 08:46:28 client updated RTT: 31.965ms (σ: 12.012ms) 2025/09/12 08:46:28 client ECN capability confirmed. 2025/09/12 08:46:28 client Canceling loss detection timer. 2025/09/12 08:46:28 client Dropping Handshake keys. 2025/09/12 08:46:28 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:28 client <- &wire.NewTokenFrame{Token: 0x28a10a97884768efe77e230085ed10be2ff38a24928a8fa9d67b4ee057cb21fbc8852f3fa9b0526a27938317a7a398cbb42125e441acbeb8e4165b1c3d92c7c5c9e29493c117ecbdc1ba75ff4b71b291b621eb0f02d2aea89949ff} 2025/09/12 08:46:28 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:28 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:28 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:28 client -> Sending packet 3 (31 bytes) for connection a9486e2b337e55ce7a92b2422aee36, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: 88c2cdfc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 74.8µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:28 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:28 client -> Sending packet 4 (26 bytes) for connection a9486e2b337e55ce7a92b2422aee36, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:28 client Short Header{DestConnectionID: 88c2cdfc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:28 client Connection a9486e2b337e55ce7a92b2422aee36 closed. 2025/09/12 08:46:28 Requesting https://server4:443/hswpnwwvsb. 2025/09/12 08:46:28 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:28 Increased send buffer size to 14336 kiB 2025/09/12 08:46:28 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:28 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:28 Created qlog file: /logs/qlog/4bd7dfbf1aae0dae3c1a4ee4fb.sqlog 2025/09/12 08:46:28 client Starting new connection to server4 ([::]:40935 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4bd7dfbf1aae0dae3c1a4ee4fb, version v1 2025/09/12 08:46:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:28 client -> Sending packet 0 (1280 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 4bd7dfbf1aae0dae3c1a4ee4fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:28 client -> Sending packet 1 (1280 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Initial 2025/09/12 08:46:28 client Long Header{Type: Initial, DestConnectionID: 4bd7dfbf1aae0dae3c1a4ee4fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 1235, Data length: 270, Offset + Data length: 1505} 2025/09/12 08:46:28 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa5203fc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:29 client Received first packet. Switching destination connection ID to: aa5203fc 2025/09/12 08:46:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:29 client newly acked packets (1): [0] 2025/09/12 08:46:29 client updated RTT: 32.003225ms (σ: 16.001612ms) 2025/09/12 08:46:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:29 client -> Sending packet 2 (1280 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: aa5203fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 1235, Data length: 270, Offset + Data length: 1505} 2025/09/12 08:46:29 client -> Sending packet 3 (1280 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: aa5203fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 1235, Data length: 270, Offset + Data length: 1505} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa5203fc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client -> Sending packet 4 (1280 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: aa5203fc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:29 client Parsed a coalesced packet. Part 1: 745 bytes. Remaining: 91 bytes. 2025/09/12 08:46:29 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aa5203fc, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 08:46:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4bd7dfbf1aae0dae3c1a4ee4fb, InitialSourceConnectionID: aa5203fc, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xaac463f4ed36e51bc96ce92f661195e6, EnableResetStreamAt: false} 2025/09/12 08:46:29 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 64f3e5d4, StatelessResetToken: 0x085120ebbc3a552cc92fbd49ba3309d4} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 488096a6, StatelessResetToken: 0x96b3090ea0f6407b4a2c2127d5bcf9b9} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 45f961f7, StatelessResetToken: 0xaa34a5b499085911298ab1e38b264816} 2025/09/12 08:46:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:29 client -> Sending packet 0 (119 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: 45f961f7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:29 client Short Header{DestConnectionID: 45f961f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:29 client Dropping Initial keys. 2025/09/12 08:46:29 client -> Sending packet 1 (28 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 45f961f7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 502.285µs} 2025/09/12 08:46:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:29 client -> Sending packet 1 (70 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: 45f961f7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:29 client -> Sending packet 2 (70 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: 45f961f7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:29 client <- Reading packet 4 (288 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:29 client Dropping Handshake keys. 2025/09/12 08:46:29 client <- &wire.NewTokenFrame{Token: 0xd732c35d937c3f097671b76cdd61ad482490d550c7aa928cf444ea78bc1104179e25def4f06f74594745123f1c5b5f77224e88569e1f6694a7935ded4c1994a57a1ed2d4c09771b9225e55177a0ab31dd98830d6dcb247751abb86} 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:29 client -> Sending packet 3 (54 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 45f961f7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 124.402µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:29 client -> Sending packet 4 (44 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 45f961f7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:29 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:29 client -> Sending packet 5 (26 bytes) for connection 4bd7dfbf1aae0dae3c1a4ee4fb, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 45f961f7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:29 client Connection 4bd7dfbf1aae0dae3c1a4ee4fb closed. 2025/09/12 08:46:29 Requesting https://server4:443/rnbypwudhf. 2025/09/12 08:46:29 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:29 Increased send buffer size to 14336 kiB 2025/09/12 08:46:29 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:29 Created qlog file: /logs/qlog/31b2414b37eead781fe5f624328f006c57c11a.sqlog 2025/09/12 08:46:29 client Starting new connection to server4 ([::]:50733 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 31b2414b37eead781fe5f624328f006c57c11a, version v1 2025/09/12 08:46:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:29 client -> Sending packet 0 (1280 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 31b2414b37eead781fe5f624328f006c57c11a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:29 client -> Sending packet 1 (1280 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 31b2414b37eead781fe5f624328f006c57c11a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 1229, Data length: 280, Offset + Data length: 1509} 2025/09/12 08:46:29 client Parsed a coalesced packet. Part 1: 760 bytes. Remaining: 91 bytes. 2025/09/12 08:46:29 client Queueing packet (760 bytes) for later decryption 2025/09/12 08:46:29 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:29 client -> Sending packet 2 (1280 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 31b2414b37eead781fe5f624328f006c57c11a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:29 client -> Sending packet 3 (1280 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 31b2414b37eead781fe5f624328f006c57c11a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 1229, Data length: 280, Offset + Data length: 1509} 2025/09/12 08:46:29 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffbf935c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:29 client Received first packet. Switching destination connection ID to: ffbf935c 2025/09/12 08:46:29 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:29 client newly acked packets (1): [3] 2025/09/12 08:46:29 client updated RTT: 32.8872ms (σ: 16.4436ms) 2025/09/12 08:46:29 client setting loss timer for packet 2 (Initial) to 36.9981ms (in 2025-09-12 08:46:29.468626317 +0000 UTC m=+24.603915117) 2025/09/12 08:46:29 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffbf935c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client -> Sending packet 4 (1280 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: ffbf935c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:29 client <- Reading packet 0 (760 bytes) for connection (empty), Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffbf935c, PacketNumber: 0, PacketNumberLen: 2, Length: 747, Version: v1} 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/09/12 08:46:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 31b2414b37eead781fe5f624328f006c57c11a, InitialSourceConnectionID: ffbf935c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x0c85e19aeba96d7baccdc86b9dca8c01, EnableResetStreamAt: false} 2025/09/12 08:46:29 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2a7277f6, StatelessResetToken: 0x871e9044d1009ca34039b2abda7baadb} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 59909dbe, StatelessResetToken: 0xf440785c0ed939718521d1539af2c537} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a72e49c0, StatelessResetToken: 0xeadfddabc1d42118411706f7de9e60dd} 2025/09/12 08:46:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:29 client -> Sending packet 0 (119 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: 59909dbe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:29 client Short Header{DestConnectionID: 59909dbe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:29 client Dropping Initial keys. 2025/09/12 08:46:29 client -> Sending packet 1 (31 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 59909dbe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.104896ms} 2025/09/12 08:46:29 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/09/12 08:46:29 client <- Reading packet 1 (297 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 648µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:29 client Peer doesn't await address validation any longer. 2025/09/12 08:46:29 client newly acked packets (1): [0] 2025/09/12 08:46:29 client Canceling loss detection timer. 2025/09/12 08:46:29 client Dropping Handshake keys. 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:29 client <- &wire.NewTokenFrame{Token: 0x120ca7dd5e5ea728b70fe3ff43488101df4b474d2166ff277d6b9686710a5bbecc7b6b92c730ba6f9c0454e7424607e8b597786003fe62635f26ba33788ca9fc8828186cd9f3637d0de9b843f58c21f9c96b27b4a13905e1775009} 2025/09/12 08:46:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:29 client <- Reading packet 2 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:29 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:29 client -> Sending packet 2 (31 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 59909dbe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 62.977µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:29 client -> Sending packet 3 (26 bytes) for connection 31b2414b37eead781fe5f624328f006c57c11a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: 59909dbe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:29 client Connection 31b2414b37eead781fe5f624328f006c57c11a closed. 2025/09/12 08:46:29 Requesting https://server4:443/jopltqbque. 2025/09/12 08:46:29 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:29 Increased send buffer size to 14336 kiB 2025/09/12 08:46:29 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:29 Created qlog file: /logs/qlog/25c901a61aed2be45336f15199aa9d1b479b5337.sqlog 2025/09/12 08:46:29 client Starting new connection to server4 ([::]:52229 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 25c901a61aed2be45336f15199aa9d1b479b5337, version v1 2025/09/12 08:46:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:29 client -> Sending packet 0 (1280 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 25c901a61aed2be45336f15199aa9d1b479b5337, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 08:46:29 client -> Sending packet 1 (1280 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 25c901a61aed2be45336f15199aa9d1b479b5337, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 1228, Data length: 288, Offset + Data length: 1516} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:29 client -> Sending packet 2 (1280 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 25c901a61aed2be45336f15199aa9d1b479b5337, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 08:46:29 client -> Sending packet 3 (1280 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: 25c901a61aed2be45336f15199aa9d1b479b5337, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 1228, Data length: 288, Offset + Data length: 1516} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:29 client Parsed a coalesced packet. Part 1: 764 bytes. Remaining: 91 bytes. 2025/09/12 08:46:29 client Queueing packet (764 bytes) for later decryption 2025/09/12 08:46:29 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:29 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e71752b2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client Received first packet. Switching destination connection ID to: e71752b2 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client -> Sending packet 4 (1280 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Initial 2025/09/12 08:46:29 client Long Header{Type: Initial, DestConnectionID: e71752b2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 08:46:29 client <- Reading packet 0 (764 bytes) for connection (empty), Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e71752b2, PacketNumber: 0, PacketNumberLen: 2, Length: 751, Version: v1} 2025/09/12 08:46:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 08:46:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 25c901a61aed2be45336f15199aa9d1b479b5337, InitialSourceConnectionID: e71752b2, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xfe3750831fb85778bc332a86fc763a22, EnableResetStreamAt: false} 2025/09/12 08:46:29 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ec375ad, StatelessResetToken: 0xfa4ae9125eb9b6f37b6f2120de9edf76} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ac42cd20, StatelessResetToken: 0x1379cd0410fbc765355eff7cc6963749} 2025/09/12 08:46:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e0610357, StatelessResetToken: 0xea18387faf3fc7e513645233ce737760} 2025/09/12 08:46:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:29 client -> Sending packet 0 (100 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Handshake 2025/09/12 08:46:29 client Long Header{Type: Handshake, DestConnectionID: e0610357, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:29 client Short Header{DestConnectionID: e0610357, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:29 client Dropping Initial keys. 2025/09/12 08:46:29 client -> Sending packet 1 (50 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:29 client Short Header{DestConnectionID: e0610357, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.85209ms} 2025/09/12 08:46:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:30 client -> Sending packet 1 (70 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: e0610357, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 client -> Sending packet 2 (70 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: e0610357, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.NewTokenFrame{Token: 0xd4c88ca06cd08b1072156b243204ef63de1efc2501d4cc12a9093690b133ec5f1bfe8b474f57d525cc9defc5b18725095ae865a92cb4a2665aa747d394a77e21f054bd397b14780ead092c00cb24496be2fc43adbc9fdb67781d31} 2025/09/12 08:46:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:30 client Dropping Handshake keys. 2025/09/12 08:46:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ec375ad, StatelessResetToken: 0xfa4ae9125eb9b6f37b6f2120de9edf76} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ac42cd20, StatelessResetToken: 0x1379cd0410fbc765355eff7cc6963749} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e0610357, StatelessResetToken: 0xea18387faf3fc7e513645233ce737760} 2025/09/12 08:46:30 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:30 client -> Sending packet 3 (35 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: e0610357, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 170.638µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:30 client Skipping packet number 2 2025/09/12 08:46:30 client -> Sending packet 4 (42 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: e0610357, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:30 client -> Sending packet 5 (1366 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: e0610357, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.PingFrame{} 2025/09/12 08:46:30 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ac42cd20, StatelessResetToken: 0x1379cd0410fbc765355eff7cc6963749} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e0610357, StatelessResetToken: 0xea18387faf3fc7e513645233ce737760} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ec375ad, StatelessResetToken: 0xfa4ae9125eb9b6f37b6f2120de9edf76} 2025/09/12 08:46:30 client <- &wire.NewTokenFrame{Token: 0xd4c88ca06cd08b1072156b243204ef63de1efc2501d4cc12a9093690b133ec5f1bfe8b474f57d525cc9defc5b18725095ae865a92cb4a2665aa747d394a77e21f054bd397b14780ead092c00cb24496be2fc43adbc9fdb67781d31} 2025/09/12 08:46:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:30 client <- Reading packet 4 (30 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200.472ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:30 client <- Reading packet 5 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:30 client -> Sending packet 6 (33 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: e0610357, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 61.724µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:30 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:30 client -> Sending packet 7 (26 bytes) for connection 25c901a61aed2be45336f15199aa9d1b479b5337, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: e0610357, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:30 client Connection 25c901a61aed2be45336f15199aa9d1b479b5337 closed. 2025/09/12 08:46:30 Requesting https://server4:443/gjlvdbtsjb. 2025/09/12 08:46:30 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:30 Increased send buffer size to 14336 kiB 2025/09/12 08:46:30 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:30 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:30 Created qlog file: /logs/qlog/0cef206d20ca47f5befd227d.sqlog 2025/09/12 08:46:30 client Starting new connection to server4 ([::]:46652 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0cef206d20ca47f5befd227d, version v1 2025/09/12 08:46:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:30 client -> Sending packet 0 (1280 bytes) for connection 0cef206d20ca47f5befd227d, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 0cef206d20ca47f5befd227d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 08:46:30 client -> Sending packet 1 (1280 bytes) for connection 0cef206d20ca47f5befd227d, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 0cef206d20ca47f5befd227d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:30 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 754d048a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:30 client Received first packet. Switching destination connection ID to: 754d048a 2025/09/12 08:46:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:30 client newly acked packets (1): [0] 2025/09/12 08:46:30 client updated RTT: 32.001121ms (σ: 16.00056ms) 2025/09/12 08:46:30 client Parsed a coalesced packet. Part 1: 745 bytes. Remaining: 91 bytes. 2025/09/12 08:46:30 client Queueing packet (745 bytes) for later decryption 2025/09/12 08:46:30 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:30 client -> Sending packet 2 (1280 bytes) for connection 0cef206d20ca47f5befd227d, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 754d048a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 08:46:30 client -> Sending packet 3 (1280 bytes) for connection 0cef206d20ca47f5befd227d, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 754d048a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 08:46:30 client <- Reading packet 2 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 754d048a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:30 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:30 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 754d048a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:30 client -> Sending packet 4 (1280 bytes) for connection 0cef206d20ca47f5befd227d, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 754d048a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:30 client <- Reading packet 0 (745 bytes) for connection (empty), Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 754d048a, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/09/12 08:46:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 08:46:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0cef206d20ca47f5befd227d, InitialSourceConnectionID: 754d048a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x1cacb74b98dad5febf078c2cd791cde8, EnableResetStreamAt: false} 2025/09/12 08:46:30 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3746be96, StatelessResetToken: 0xe7a741187049cebfaf48502ff86330ef} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65237e86, StatelessResetToken: 0xedbd6e3e649d9a0d07a63ab4900c43ea} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecaa7b5a, StatelessResetToken: 0x88d910c5618808fc88d76c67a07a600b} 2025/09/12 08:46:30 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:30 client -> Sending packet 0 (119 bytes) for connection 0cef206d20ca47f5befd227d, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: 65237e86, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 client Short Header{DestConnectionID: 65237e86, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:30 client Dropping Initial keys. 2025/09/12 08:46:30 client -> Sending packet 1 (31 bytes) for connection 0cef206d20ca47f5befd227d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: 65237e86, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.456403ms} 2025/09/12 08:46:30 client Dropping %!s(logging.PacketType=0) packet (1280 bytes) because we already dropped the keys. 2025/09/12 08:46:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:30 client -> Sending packet 1 (70 bytes) for connection 0cef206d20ca47f5befd227d, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: 65237e86, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 client -> Sending packet 2 (70 bytes) for connection 0cef206d20ca47f5befd227d, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: 65237e86, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 08:46:30 client -> Sending packet 3 (70 bytes) for connection 0cef206d20ca47f5befd227d, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: 65237e86, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 client -> Sending packet 4 (70 bytes) for connection 0cef206d20ca47f5befd227d, Handshake 2025/09/12 08:46:30 client Long Header{Type: Handshake, DestConnectionID: 65237e86, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:30 client <- Reading packet 6 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3746be96, StatelessResetToken: 0xe7a741187049cebfaf48502ff86330ef} 2025/09/12 08:46:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecaa7b5a, StatelessResetToken: 0x88d910c5618808fc88d76c67a07a600b} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65237e86, StatelessResetToken: 0xedbd6e3e649d9a0d07a63ab4900c43ea} 2025/09/12 08:46:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:30 client Dropping Handshake keys. 2025/09/12 08:46:30 client <- &wire.NewTokenFrame{Token: 0xfd2646c9dde86f56b9a80e8fb4970b7f26b0c10b5072620beaa35a3433b73649dd4e69aa64f371cfd76fb5fcd8e1f315381d5e241c7205e7c408257bc26bce6f5dff028d20c6a2646b22f0a421609a02b38f403061a7712b0f} 2025/09/12 08:46:30 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:30 client -> Sending packet 3 (54 bytes) for connection 0cef206d20ca47f5befd227d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: 65237e86, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 213.577µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:30 client -> Sending packet 4 (44 bytes) for connection 0cef206d20ca47f5befd227d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: 65237e86, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:30 client <- Reading packet 7 (358 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65237e86, StatelessResetToken: 0xedbd6e3e649d9a0d07a63ab4900c43ea} 2025/09/12 08:46:30 client <- &wire.NewTokenFrame{Token: 0xfd2646c9dde86f56b9a80e8fb4970b7f26b0c10b5072620beaa35a3433b73649dd4e69aa64f371cfd76fb5fcd8e1f315381d5e241c7205e7c408257bc26bce6f5dff028d20c6a2646b22f0a421609a02b38f403061a7712b0f} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3746be96, StatelessResetToken: 0xe7a741187049cebfaf48502ff86330ef} 2025/09/12 08:46:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecaa7b5a, StatelessResetToken: 0x88d910c5618808fc88d76c67a07a600b} 2025/09/12 08:46:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:30 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:30 client -> Sending packet 5 (34 bytes) for connection 0cef206d20ca47f5befd227d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: 65237e86, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 25.303162ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:30 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 152µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:30 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:30 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:30 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:30 client -> Sending packet 6 (26 bytes) for connection 0cef206d20ca47f5befd227d, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:30 client Short Header{DestConnectionID: 65237e86, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:30 client Connection 0cef206d20ca47f5befd227d closed. 2025/09/12 08:46:30 Requesting https://server4:443/tdjmoxlipe. 2025/09/12 08:46:30 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:30 Increased send buffer size to 14336 kiB 2025/09/12 08:46:30 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:30 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:30 Created qlog file: /logs/qlog/97cb5f256901e57ccd9f4c0c30ef1a4460801e.sqlog 2025/09/12 08:46:30 client Starting new connection to server4 ([::]:51338 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 97cb5f256901e57ccd9f4c0c30ef1a4460801e, version v1 2025/09/12 08:46:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:30 client -> Sending packet 0 (1280 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 97cb5f256901e57ccd9f4c0c30ef1a4460801e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:30 client -> Sending packet 1 (1280 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Initial 2025/09/12 08:46:30 client Long Header{Type: Initial, DestConnectionID: 97cb5f256901e57ccd9f4c0c30ef1a4460801e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:30 client -> &wire.CryptoFrame{Offset: 1229, Data length: 286, Offset + Data length: 1515} 2025/09/12 08:46:31 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65b6b8f5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:31 client Received first packet. Switching destination connection ID to: 65b6b8f5 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:31 client newly acked packets (1): [0] 2025/09/12 08:46:31 client updated RTT: 31.926293ms (σ: 15.963146ms) 2025/09/12 08:46:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:31 client -> Sending packet 2 (1280 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 1229, Data length: 286, Offset + Data length: 1515} 2025/09/12 08:46:31 client -> Sending packet 3 (1280 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 1229, Data length: 286, Offset + Data length: 1515} 2025/09/12 08:46:31 client <- Reading packet 2 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65b6b8f5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:31 client newly acked packets (1): [3] 2025/09/12 08:46:31 client updated RTT: 32.209ms (σ: 12.538ms) 2025/09/12 08:46:31 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:31 client -> Sending packet 4 (1280 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.PingFrame{} 2025/09/12 08:46:31 client <- Reading packet 3 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65b6b8f5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:31 client newly acked packets (1): [4] 2025/09/12 08:46:31 client updated RTT: 32.181ms (σ: 9.458ms) 2025/09/12 08:46:31 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65b6b8f5, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client -> Sending packet 5 (1280 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:31 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 65b6b8f5, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 97cb5f256901e57ccd9f4c0c30ef1a4460801e, InitialSourceConnectionID: 65b6b8f5, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x62a6e054cb25f73be9884a7f8269ed0a, EnableResetStreamAt: false} 2025/09/12 08:46:31 client -> Sending packet 0 (75 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:31 client Dropping Initial keys. 2025/09/12 08:46:31 client <- Reading packet 2 (753 bytes) for connection (empty), Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 65b6b8f5, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 08:46:31 client -> Sending packet 1 (36 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:31 client -> Sending packet 0 (42 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: 65b6b8f5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:31 client -> Sending packet 2 (70 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:31 client -> Sending packet 3 (70 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: 65b6b8f5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:31 client <- Reading packet 2 (359 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2edfeeda, StatelessResetToken: 0xf70e2e38b45a8e3cf3d6100455e96b3e} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 81277390, StatelessResetToken: 0x098ab014ba9a71d1e6f5272d04425bf9} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:31 client Dropping Handshake keys. 2025/09/12 08:46:31 client <- &wire.NewTokenFrame{Token: 0x00dedc223ba191138e927fdb993c06680147df3ffa88b82663c494f5dda2b6b536868585c9e0d9498721b295b8f1883019351c917fd0b5b667e727e23fa859fc8e2c97af2fe088b6cbe72a1ac922f372297707d6a5303e32a1ad} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e1dc905, StatelessResetToken: 0xfd9d7e889868550e521e4e6e9a75bcbe} 2025/09/12 08:46:31 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:31 client -> Sending packet 2 (52 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: 3e1dc905, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 129.201µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:31 client -> Sending packet 3 (44 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: 3e1dc905, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:31 client <- Reading packet 3 (359 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2edfeeda, StatelessResetToken: 0xf70e2e38b45a8e3cf3d6100455e96b3e} 2025/09/12 08:46:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 81277390, StatelessResetToken: 0x098ab014ba9a71d1e6f5272d04425bf9} 2025/09/12 08:46:31 client <- &wire.NewTokenFrame{Token: 0x00dedc223ba191138e927fdb993c06680147df3ffa88b82663c494f5dda2b6b536868585c9e0d9498721b295b8f1883019351c917fd0b5b667e727e23fa859fc8e2c97af2fe088b6cbe72a1ac922f372297707d6a5303e32a1ad} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e1dc905, StatelessResetToken: 0xfd9d7e889868550e521e4e6e9a75bcbe} 2025/09/12 08:46:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:31 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 70.768ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:31 client -> Sending packet 4 (32 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: 3e1dc905, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.142966ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client <- Reading packet 8 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:31 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:31 client -> Sending packet 5 (35 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: 3e1dc905, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 105.657µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:31 client -> Sending packet 6 (26 bytes) for connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: 3e1dc905, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:31 client Connection 97cb5f256901e57ccd9f4c0c30ef1a4460801e closed. 2025/09/12 08:46:31 Requesting https://server4:443/lldwbjsdvb. 2025/09/12 08:46:31 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:31 Increased send buffer size to 14336 kiB 2025/09/12 08:46:31 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:31 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:31 Created qlog file: /logs/qlog/f3ddda037b74aa24c7ad4d53a2686c.sqlog 2025/09/12 08:46:31 client Starting new connection to server4 ([::]:48839 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f3ddda037b74aa24c7ad4d53a2686c, version v1 2025/09/12 08:46:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:31 client -> Sending packet 0 (1280 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: f3ddda037b74aa24c7ad4d53a2686c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 08:46:31 client -> Sending packet 1 (1280 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: f3ddda037b74aa24c7ad4d53a2686c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 1233, Data length: 274, Offset + Data length: 1507} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:31 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5f1c9c4c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:31 client Received first packet. Switching destination connection ID to: 5f1c9c4c 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:31 client newly acked packets (1): [0] 2025/09/12 08:46:31 client updated RTT: 32.012683ms (σ: 16.006341ms) 2025/09/12 08:46:31 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:31 client -> Sending packet 2 (1280 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 5f1c9c4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 1233, Data length: 274, Offset + Data length: 1507} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:31 client -> Sending packet 3 (1280 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 5f1c9c4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 1233, Data length: 274, Offset + Data length: 1507} 2025/09/12 08:46:31 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5f1c9c4c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client -> Sending packet 4 (1280 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: 5f1c9c4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:31 client Parsed a coalesced packet. Part 1: 742 bytes. Remaining: 91 bytes. 2025/09/12 08:46:31 client <- Reading packet 0 (742 bytes) for connection (empty), Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5f1c9c4c, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/09/12 08:46:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f3ddda037b74aa24c7ad4d53a2686c, InitialSourceConnectionID: 5f1c9c4c, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x5f7ba4ca05db259cb4c34bf0f623a304, EnableResetStreamAt: false} 2025/09/12 08:46:31 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 02f57375, StatelessResetToken: 0xc2658938188252b196987094b5e66594} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 482a614f, StatelessResetToken: 0x611dccb0c1f4a56a03e06287f1e4455f} 2025/09/12 08:46:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d5ced47a, StatelessResetToken: 0x1a6f0eff3db1200efb183ca66dad6b0d} 2025/09/12 08:46:31 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:31 client -> Sending packet 0 (100 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, Handshake 2025/09/12 08:46:31 client Long Header{Type: Handshake, DestConnectionID: d5ced47a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:31 client Short Header{DestConnectionID: d5ced47a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:31 client Dropping Initial keys. 2025/09/12 08:46:31 client -> Sending packet 1 (47 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: d5ced47a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 459.084µs} 2025/09/12 08:46:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:31 client <- Reading packet 1 (293 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/09/12 08:46:31 client Peer doesn't await address validation any longer. 2025/09/12 08:46:31 client newly acked packets (1): [0] 2025/09/12 08:46:31 client updated RTT: 31.963ms (σ: 12.1ms) 2025/09/12 08:46:31 client Dropping Handshake keys. 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:31 client <- &wire.NewTokenFrame{Token: 0xe223e9130073a434e207816050827f3d10f3bd2eefc2ced70c6a11cdec5270ec8de7a244bf8f8c0ada926f7fc009c10d7ddc6a74b93092c0f33fd3c8a1aa9808c559791859f36956a272819d5d40451753f25602edc70b08090219} 2025/09/12 08:46:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:31 client <- Reading packet 2 (1053 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 432µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client newly acked packets (1): [1] 2025/09/12 08:46:31 client updated RTT: 31.97ms (σ: 9.09ms) 2025/09/12 08:46:31 client ECN capability confirmed. 2025/09/12 08:46:31 client Canceling loss detection timer. 2025/09/12 08:46:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:31 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:31 client Ignoring all packets below 1. 2025/09/12 08:46:31 client -> Sending packet 2 (31 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: d5ced47a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 110.896µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:31 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:31 client -> Sending packet 3 (26 bytes) for connection f3ddda037b74aa24c7ad4d53a2686c, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:31 client Short Header{DestConnectionID: d5ced47a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:31 client Connection f3ddda037b74aa24c7ad4d53a2686c closed. 2025/09/12 08:46:31 Requesting https://server4:443/detkfapxsp. 2025/09/12 08:46:31 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:31 Increased send buffer size to 14336 kiB 2025/09/12 08:46:31 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:31 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:31 Created qlog file: /logs/qlog/f6a6a71f87ff4de60a.sqlog 2025/09/12 08:46:31 client Starting new connection to server4 ([::]:37223 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f6a6a71f87ff4de60a, version v1 2025/09/12 08:46:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:31 client -> Sending packet 0 (1280 bytes) for connection f6a6a71f87ff4de60a, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: f6a6a71f87ff4de60a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 08:46:31 client -> Sending packet 1 (1280 bytes) for connection f6a6a71f87ff4de60a, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: f6a6a71f87ff4de60a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:31 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 08:46:31 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0e09310, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client Received first packet. Switching destination connection ID to: e0e09310 2025/09/12 08:46:31 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:31 client newly acked packets (2): [0 1] 2025/09/12 08:46:31 client updated RTT: 34.252201ms (σ: 17.1261ms) 2025/09/12 08:46:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:31 client -> Sending packet 2 (1280 bytes) for connection f6a6a71f87ff4de60a, Initial 2025/09/12 08:46:31 client Long Header{Type: Initial, DestConnectionID: e0e09310, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:31 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:32 client <- Reading packet 2 (748 bytes) for connection (empty), Handshake 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0e09310, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 08:46:32 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f6a6a71f87ff4de60a, InitialSourceConnectionID: e0e09310, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x0d7f7e2ae4db6a80e46fd57c70d73429, EnableResetStreamAt: false} 2025/09/12 08:46:32 client -> Sending packet 0 (75 bytes) for connection f6a6a71f87ff4de60a, Handshake 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: e0e09310, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:32 client Dropping Initial keys. 2025/09/12 08:46:32 client -> Sending packet 0 (42 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: e0e09310, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:32 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 08:46:32 client -> Sending packet 1 (70 bytes) for connection f6a6a71f87ff4de60a, Handshake 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: e0e09310, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:32 client -> Sending packet 2 (70 bytes) for connection f6a6a71f87ff4de60a, Handshake 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: e0e09310, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:32 client <- Reading packet 2 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c4a3f0e, StatelessResetToken: 0x5ea7affcd071806440b7e8219b56afb1} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1849f3e7, StatelessResetToken: 0x2a89de1bcb62815d591a82d8103b7bbf} 2025/09/12 08:46:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:32 client Dropping Handshake keys. 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be5e2bb, StatelessResetToken: 0x4d9898dab20989dc017559e765d21ef8} 2025/09/12 08:46:32 client <- &wire.NewTokenFrame{Token: 0xd279586e0dd4b3d62b17fedbe4c0bcf68ca8f23425d0c4a9e21c1253b9f1e1bbb6e8fef2e0f8ff695115c3fdbcf2396dadb9799f751206143422ca1bd53deef01d382022389db00fad3aa00f1c3ef446023bdd08ed39a20359cf56} 2025/09/12 08:46:32 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:32 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 08:46:32 client -> Sending packet 2 (52 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 8be5e2bb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 142.344µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:32 client -> Sending packet 3 (44 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 8be5e2bb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:32 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:32 client <- &wire.NewTokenFrame{Token: 0xd279586e0dd4b3d62b17fedbe4c0bcf68ca8f23425d0c4a9e21c1253b9f1e1bbb6e8fef2e0f8ff695115c3fdbcf2396dadb9799f751206143422ca1bd53deef01d382022389db00fad3aa00f1c3ef446023bdd08ed39a20359cf56} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c4a3f0e, StatelessResetToken: 0x5ea7affcd071806440b7e8219b56afb1} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be5e2bb, StatelessResetToken: 0x4d9898dab20989dc017559e765d21ef8} 2025/09/12 08:46:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1849f3e7, StatelessResetToken: 0x2a89de1bcb62815d591a82d8103b7bbf} 2025/09/12 08:46:32 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:32 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:32 client -> Sending packet 4 (32 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 8be5e2bb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.297947ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:32 client <- Reading packet 6 (29 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:32 client newly acked packets (1): [3] 2025/09/12 08:46:32 client updated RTT: 33.811ms (σ: 13.725ms) 2025/09/12 08:46:32 client ECN capability confirmed. 2025/09/12 08:46:32 client Canceling loss detection timer. 2025/09/12 08:46:32 client <- Reading packet 8 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be5e2bb, StatelessResetToken: 0x4d9898dab20989dc017559e765d21ef8} 2025/09/12 08:46:32 client <- &wire.NewTokenFrame{Token: 0xd279586e0dd4b3d62b17fedbe4c0bcf68ca8f23425d0c4a9e21c1253b9f1e1bbb6e8fef2e0f8ff695115c3fdbcf2396dadb9799f751206143422ca1bd53deef01d382022389db00fad3aa00f1c3ef446023bdd08ed39a20359cf56} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c4a3f0e, StatelessResetToken: 0x5ea7affcd071806440b7e8219b56afb1} 2025/09/12 08:46:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1849f3e7, StatelessResetToken: 0x2a89de1bcb62815d591a82d8103b7bbf} 2025/09/12 08:46:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:32 client -> Sending packet 5 (1366 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 8be5e2bb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.PingFrame{} 2025/09/12 08:46:32 client -> Sending packet 6 (35 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 8be5e2bb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 200.282µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 08:46:32 client <- Reading packet 9 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:32 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:32 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:32 client -> Sending packet 7 (26 bytes) for connection f6a6a71f87ff4de60a, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 8be5e2bb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:32 client Connection f6a6a71f87ff4de60a closed. 2025/09/12 08:46:32 Requesting https://server4:443/usptqtkpco. 2025/09/12 08:46:32 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:32 Increased send buffer size to 14336 kiB 2025/09/12 08:46:32 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:32 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:32 Created qlog file: /logs/qlog/cb3af5beb8644b1ff0.sqlog 2025/09/12 08:46:32 client Starting new connection to server4 ([::]:57733 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cb3af5beb8644b1ff0, version v1 2025/09/12 08:46:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:32 client -> Sending packet 0 (1280 bytes) for connection cb3af5beb8644b1ff0, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: cb3af5beb8644b1ff0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:32 client -> Sending packet 1 (1280 bytes) for connection cb3af5beb8644b1ff0, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: cb3af5beb8644b1ff0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 1239, Data length: 269, Offset + Data length: 1508} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:32 client Parsed a coalesced packet. Part 1: 738 bytes. Remaining: 91 bytes. 2025/09/12 08:46:32 client Queueing packet (738 bytes) for later decryption 2025/09/12 08:46:32 client Queueing packet (91 bytes) for later decryption 2025/09/12 08:46:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 08:46:32 client -> Sending packet 2 (1280 bytes) for connection cb3af5beb8644b1ff0, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: cb3af5beb8644b1ff0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 08:46:32 client -> Sending packet 3 (1280 bytes) for connection cb3af5beb8644b1ff0, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: cb3af5beb8644b1ff0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 1239, Data length: 269, Offset + Data length: 1508} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:32 client <- Reading packet 3 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9bacc76, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client Received first packet. Switching destination connection ID to: e9bacc76 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:32 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client -> Sending packet 4 (1280 bytes) for connection cb3af5beb8644b1ff0, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: e9bacc76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 08:46:32 client <- Reading packet 0 (738 bytes) for connection (empty), Handshake 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e9bacc76, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 08:46:32 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cb3af5beb8644b1ff0, InitialSourceConnectionID: e9bacc76, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x210a4ddf039ad283231a312fb677d285, EnableResetStreamAt: false} 2025/09/12 08:46:32 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 81c7fbec, StatelessResetToken: 0x1e9eba463c52f4b407db286b3e108182} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d886b4f3, StatelessResetToken: 0xefc5e1f3fde2edd56a9acdae5a46f4ae} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f0223d7, StatelessResetToken: 0x937e78ad80a5322671874fd3123e6ac2} 2025/09/12 08:46:32 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:32 client <- Reading packet 4 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9bacc76, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cb3af5beb8644b1ff0 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: 7f0223d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: 7f0223d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:32 client Short Header{DestConnectionID: 7f0223d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:32 client Dropping Initial keys. 2025/09/12 08:46:32 client -> Sending packet 1 (36 bytes) for connection cb3af5beb8644b1ff0, Handshake 2025/09/12 08:46:32 client Long Header{Type: Handshake, DestConnectionID: 7f0223d7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:32 client -> Sending packet 1 (31 bytes) for connection cb3af5beb8644b1ff0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 7f0223d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.706188ms} 2025/09/12 08:46:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:32 client <- Reading packet 3 (360 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:32 client Dropping Handshake keys. 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d886b4f3, StatelessResetToken: 0xefc5e1f3fde2edd56a9acdae5a46f4ae} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 81c7fbec, StatelessResetToken: 0x1e9eba463c52f4b407db286b3e108182} 2025/09/12 08:46:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f0223d7, StatelessResetToken: 0x937e78ad80a5322671874fd3123e6ac2} 2025/09/12 08:46:32 client <- &wire.NewTokenFrame{Token: 0xf469b95b94ecb3ef20c7e4b2c578c38d8ba5ec8db91de53b5a841eb5697d881e37d4e0445606da6a60323487412a64373027e56c759ec20d3ca13af414d1fd239cf3d0de5c9ade523880ce142f7d58dd4cd80a5a572185ab1fe1f2} 2025/09/12 08:46:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:32 client -> Sending packet 2 (1366 bytes) for connection cb3af5beb8644b1ff0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 7f0223d7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.PingFrame{} 2025/09/12 08:46:32 client -> Sending packet 3 (33 bytes) for connection cb3af5beb8644b1ff0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 7f0223d7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 142.746µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:32 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:32 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:32 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:32 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:32 client -> Sending packet 4 (26 bytes) for connection cb3af5beb8644b1ff0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:32 client Short Header{DestConnectionID: 7f0223d7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:32 client Connection cb3af5beb8644b1ff0 closed. 2025/09/12 08:46:32 Requesting https://server4:443/mmtlqbrmmq. 2025/09/12 08:46:32 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:32 Increased send buffer size to 14336 kiB 2025/09/12 08:46:32 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:32 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:32 Created qlog file: /logs/qlog/3cac6624b815af745dcad56334cc7412a98e77.sqlog 2025/09/12 08:46:32 client Starting new connection to server4 ([::]:33723 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3cac6624b815af745dcad56334cc7412a98e77, version v1 2025/09/12 08:46:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:32 client -> Sending packet 0 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: 3cac6624b815af745dcad56334cc7412a98e77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:32 client -> Sending packet 1 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: 3cac6624b815af745dcad56334cc7412a98e77, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:32 client -> &wire.CryptoFrame{Offset: 1229, Data length: 275, Offset + Data length: 1504} 2025/09/12 08:46:32 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba3739dc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:32 client Received first packet. Switching destination connection ID to: ba3739dc 2025/09/12 08:46:32 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:32 client newly acked packets (1): [0] 2025/09/12 08:46:32 client updated RTT: 31.940466ms (σ: 15.970233ms) 2025/09/12 08:46:32 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba3739dc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:32 client newly acked packets (1): [1] 2025/09/12 08:46:32 client updated RTT: 32.224ms (σ: 12.546ms) 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:32 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:32 client -> Sending packet 2 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: ba3739dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:32 client -> Sending packet 3 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: ba3739dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client -> &wire.PingFrame{} 2025/09/12 08:46:32 client <- Reading packet 2 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba3739dc, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:32 client -> Sending packet 4 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: ba3739dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 08:46:32 client -> Sending packet 5 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: ba3739dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client -> &wire.PingFrame{} 2025/09/12 08:46:32 client -> Sending packet 6 (1280 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Initial 2025/09/12 08:46:32 client Long Header{Type: Initial, DestConnectionID: ba3739dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:32 client -> &wire.PingFrame{} 2025/09/12 08:46:33 client <- Reading packet 4 (39 bytes) for connection (empty), Initial 2025/09/12 08:46:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba3739dc, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 08:46:33 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 08:46:33 client <- Reading packet 1 (756 bytes) for connection (empty), Handshake 2025/09/12 08:46:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba3739dc, PacketNumber: 1, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 08:46:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3cac6624b815af745dcad56334cc7412a98e77, InitialSourceConnectionID: ba3739dc, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x423de2ab8fc7aebf1c67af09eec03e7b, EnableResetStreamAt: false} 2025/09/12 08:46:33 client -> Sending packet 0 (75 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Handshake 2025/09/12 08:46:33 client Long Header{Type: Handshake, DestConnectionID: ba3739dc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:33 client Dropping Initial keys. 2025/09/12 08:46:33 client -> Sending packet 0 (42 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: ba3739dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:33 client <- Reading packet 2 (756 bytes) for connection (empty), Handshake 2025/09/12 08:46:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba3739dc, PacketNumber: 2, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 08:46:33 client -> Sending packet 1 (36 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, Handshake 2025/09/12 08:46:33 client Long Header{Type: Handshake, DestConnectionID: ba3739dc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:33 client <- Reading packet 2 (366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:33 client Peer doesn't await address validation any longer. 2025/09/12 08:46:33 client newly acked packets (1): [0] 2025/09/12 08:46:33 client updated RTT: 32.122ms (σ: 9.612ms) 2025/09/12 08:46:33 client ECN capability confirmed. 2025/09/12 08:46:33 client Canceling loss detection timer. 2025/09/12 08:46:33 client Dropping Handshake keys. 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd9f04d4, StatelessResetToken: 0x887cc0c175a73f8bad8c66e7a2506c79} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5583192, StatelessResetToken: 0xf6c15498c0a82a38e55d014d08812a21} 2025/09/12 08:46:33 client <- &wire.NewTokenFrame{Token: 0x6e116aa8cf379592db02f7195fd9c1ba3335d40316f27b372737c1ef422565ea6ddf5c03597988a61fea1aa4826ef458b56e857895fc867e2cb540d51a3eef0aa9dba94a3a643567336570a57baafd16dbe1d16c88af03f2c8} 2025/09/12 08:46:33 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fd5be2fa, StatelessResetToken: 0xe1ceecc31e24828b653acec95174f50d} 2025/09/12 08:46:33 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:33 client -> Sending packet 1 (33 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: fd5be2fa, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 160.218µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:33 client <- Reading packet 3 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fd5be2fa, StatelessResetToken: 0xe1ceecc31e24828b653acec95174f50d} 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5583192, StatelessResetToken: 0xf6c15498c0a82a38e55d014d08812a21} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd9f04d4, StatelessResetToken: 0x887cc0c175a73f8bad8c66e7a2506c79} 2025/09/12 08:46:33 client <- &wire.NewTokenFrame{Token: 0x6e116aa8cf379592db02f7195fd9c1ba3335d40316f27b372737c1ef422565ea6ddf5c03597988a61fea1aa4826ef458b56e857895fc867e2cb540d51a3eef0aa9dba94a3a643567336570a57baafd16dbe1d16c88af03f2c8} 2025/09/12 08:46:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 920, Offset + Data length: 920} 2025/09/12 08:46:33 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:33 client <- Reading packet 4 (1366 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.PingFrame{} 2025/09/12 08:46:33 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 08:46:33 client -> Sending packet 2 (31 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: fd5be2fa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 70.872µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 08:46:33 client <- Reading packet 5 (127 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 920, Data length: 104, Offset + Data length: 1024} 2025/09/12 08:46:33 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:33 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:33 client -> Sending packet 3 (26 bytes) for connection 3cac6624b815af745dcad56334cc7412a98e77, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: fd5be2fa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:33 client Connection 3cac6624b815af745dcad56334cc7412a98e77 closed. 2025/09/12 08:46:33 Requesting https://server4:443/nylzssqdnz. 2025/09/12 08:46:33 Increased receive buffer size to 14336 kiB 2025/09/12 08:46:33 Increased send buffer size to 14336 kiB 2025/09/12 08:46:33 Setting DF for IPv4 and IPv6. 2025/09/12 08:46:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 08:46:33 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 08:46:33 Created qlog file: /logs/qlog/d31470f99a5b70b2a0c0.sqlog 2025/09/12 08:46:33 client Starting new connection to server4 ([::]:56647 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d31470f99a5b70b2a0c0, version v1 2025/09/12 08:46:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 08:46:33 client -> Sending packet 0 (1280 bytes) for connection d31470f99a5b70b2a0c0, Initial 2025/09/12 08:46:33 client Long Header{Type: Initial, DestConnectionID: d31470f99a5b70b2a0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:33 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 08:46:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 08:46:33 client -> Sending packet 1 (1280 bytes) for connection d31470f99a5b70b2a0c0, Initial 2025/09/12 08:46:33 client Long Header{Type: Initial, DestConnectionID: d31470f99a5b70b2a0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 08:46:33 client -> &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 08:46:33 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 08:46:33 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 08:46:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e7e859fe, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:33 client Received first packet. Switching destination connection ID to: e7e859fe 2025/09/12 08:46:33 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:33 client newly acked packets (2): [0 1] 2025/09/12 08:46:33 client updated RTT: 34.432731ms (σ: 17.216365ms) 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 08:46:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:33 client -> Sending packet 2 (1280 bytes) for connection d31470f99a5b70b2a0c0, Initial 2025/09/12 08:46:33 client Long Header{Type: Initial, DestConnectionID: e7e859fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 08:46:33 client Parsed a coalesced packet. Part 1: 746 bytes. Remaining: 91 bytes. 2025/09/12 08:46:33 client <- Reading packet 0 (746 bytes) for connection (empty), Handshake 2025/09/12 08:46:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e7e859fe, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 08:46:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 08:46:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d31470f99a5b70b2a0c0, InitialSourceConnectionID: e7e859fe, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0x2d506759e03474cbd5ec8fe151932d90, EnableResetStreamAt: false} 2025/09/12 08:46:33 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 37ab6044, StatelessResetToken: 0x151a0d3107f33d982bfe9386d37daa8a} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f228f4d1, StatelessResetToken: 0x5414637b07e6d1aa7cb65c2c6d972076} 2025/09/12 08:46:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ea170c98, StatelessResetToken: 0x5dc8b67a498b80dcdc205cd0f27ac886} 2025/09/12 08:46:33 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 08:46:33 client -> Sending packet 0 (100 bytes) for connection d31470f99a5b70b2a0c0, Handshake 2025/09/12 08:46:33 client Long Header{Type: Handshake, DestConnectionID: ea170c98, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 08:46:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 08:46:33 client Short Header{DestConnectionID: ea170c98, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 08:46:33 client Dropping Initial keys. 2025/09/12 08:46:33 client -> Sending packet 1 (47 bytes) for connection d31470f99a5b70b2a0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: ea170c98, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464.454µs} 2025/09/12 08:46:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 08:46:33 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 304µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:33 client Peer doesn't await address validation any longer. 2025/09/12 08:46:33 client newly acked packets (2): [0 1] 2025/09/12 08:46:33 client updated RTT: 34.075ms (σ: 13.624ms) 2025/09/12 08:46:33 client ECN capability confirmed. 2025/09/12 08:46:33 client Canceling loss detection timer. 2025/09/12 08:46:33 client Dropping Handshake keys. 2025/09/12 08:46:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 08:46:33 client <- &wire.NewTokenFrame{Token: 0xa31f08f2e919de541bd5c3f289787d93c40e2a026f660d468b92a14de81afac6d8e1566d53344bfe27c09186e01cda6b1cb43a98a399da0fdeb3887b6ec0fcb3775bb58dfd37ad8282d312bbb456d8b3d37f5620af29d83331c589} 2025/09/12 08:46:33 client <- &wire.HandshakeDoneFrame{} 2025/09/12 08:46:33 client Setting ACK timer to max ack delay: 25ms 2025/09/12 08:46:33 client Ignoring all packets below 1. 2025/09/12 08:46:33 client Sending ACK because the ACK timer expired. 2025/09/12 08:46:33 client -> Sending packet 2 (32 bytes) for connection d31470f99a5b70b2a0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: ea170c98, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.411597ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 08:46:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 08:46:33 client <- Reading packet 4 (1045 bytes) for connection (empty), 1-RTT 2025/09/12 08:46:33 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 08:46:33 client Queuing ACK because there's a new missing packet to report. 2025/09/12 08:46:33 client -> Sending packet 3 (33 bytes) for connection d31470f99a5b70b2a0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: ea170c98, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 93.203µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 08:46:33 client Closing connection with error: Application error 0x0 (local) 2025/09/12 08:46:33 client -> Sending packet 4 (26 bytes) for connection d31470f99a5b70b2a0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 08:46:33 client Short Header{DestConnectionID: ea170c98, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 08:46:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 08:46:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 08:46:33 client Connection d31470f99a5b70b2a0c0 closed.