2025/09/12 02:04:40 Requesting https://server4:443/apisbntfuh. 2025/09/12 02:04:40 Increased receive buffer size to 14336 kiB 2025/09/12 02:04:40 Increased send buffer size to 14336 kiB 2025/09/12 02:04:40 Setting DF for IPv4 and IPv6. 2025/09/12 02:04:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:04:40 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:04:40 Created qlog file: /logs/qlog/71ef965de3973627ceab.sqlog 2025/09/12 02:04:40 client Starting new connection to server4 ([::]:55737 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 71ef965de3973627ceab, version v1 2025/09/12 02:04:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 02:04:40 client -> Sending packet 0 (1280 bytes) for connection 71ef965de3973627ceab, Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: 71ef965de3973627ceab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:04:40 client -> Sending packet 1 (1280 bytes) for connection 71ef965de3973627ceab, Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: 71ef965de3973627ceab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 1238, Data length: 285, Offset + Data length: 1523} 2025/09/12 02:04:40 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e206d2a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:04:40 client Received first packet. Switching destination connection ID to: 5e206d2a 2025/09/12 02:04:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client newly acked packets (1): [0] 2025/09/12 02:04:40 client updated RTT: 37.494391ms (σ: 18.747195ms) 2025/09/12 02:04:40 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e206d2a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:04:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client newly acked packets (1): [1] 2025/09/12 02:04:40 client updated RTT: 37.676ms (σ: 14.425ms) 2025/09/12 02:04:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:04:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client -> Sending packet 2 (1280 bytes) for connection 71ef965de3973627ceab, Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: 5e206d2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client Parsed a coalesced packet. Part 1: 743 bytes. Remaining: 91 bytes. 2025/09/12 02:04:40 client <- Reading packet 0 (743 bytes) for connection (empty), Handshake 2025/09/12 02:04:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e206d2a, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/09/12 02:04:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/12 02:04:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 71ef965de3973627ceab, InitialSourceConnectionID: 5e206d2a, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xc8496d6687b4aef60d8c6407a97d663d, EnableResetStreamAt: false} 2025/09/12 02:04:40 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d1a34a6f, StatelessResetToken: 0x41515fe1feb596a97f4cab89f0f4da40} 2025/09/12 02:04:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0abd0b48, StatelessResetToken: 0x95fec3ef6da3aaf02f24fcf866485f22} 2025/09/12 02:04:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bfeae665, StatelessResetToken: 0xfed823a0ed01a1a7b3776511403e29e1} 2025/09/12 02:04:40 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:04:40 client -> Sending packet 0 (100 bytes) for connection 71ef965de3973627ceab, Handshake 2025/09/12 02:04:40 client Long Header{Type: Handshake, DestConnectionID: bfeae665, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:04:40 client Dropping Initial keys. 2025/09/12 02:04:40 client -> Sending packet 1 (29 bytes) for connection 71ef965de3973627ceab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 534.358µs} 2025/09/12 02:04:40 client -> Sending packet 2 (42 bytes) for connection 71ef965de3973627ceab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:04:40 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 392µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client Peer doesn't await address validation any longer. 2025/09/12 02:04:40 client newly acked packets (2): [0 2] 2025/09/12 02:04:40 client updated RTT: 36.915ms (σ: 12.339ms) 2025/09/12 02:04:40 client ECN capability confirmed. 2025/09/12 02:04:40 client Canceling loss detection timer. 2025/09/12 02:04:40 client Dropping Handshake keys. 2025/09/12 02:04:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:04:40 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:04:40 client <- &wire.NewTokenFrame{Token: 0x734bc03ef194a71b695bd1f798f0fbc42e38fe9d2375914975b48be3ccae16b4e41981eee333cf64e06e06904d36dcc2960209faaad6fbc987dd78f3c5bb3a610f7a4f84f15e0c89cbc6e734ecae7b90cd362e212ab5c5764f2a35} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 2 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1259, Offset + Data length: 1259} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client -> Sending packet 3 (31 bytes) for connection 71ef965de3973627ceab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 70.631µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client <- Reading packet 3 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1259, Data length: 1257, Offset + Data length: 2516} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 4 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2516, Data length: 1257, Offset + Data length: 3773} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client -> Sending packet 4 (31 bytes) for connection 71ef965de3973627ceab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 52.208µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client <- Reading packet 5 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3773, Data length: 1257, Offset + Data length: 5030} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 6 (113 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5030, Data length: 90, Offset + Data length: 5120} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client <- Reading packet 7 (23 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 5120, Data length: 0, Offset + Data length: 5120} 2025/09/12 02:04:40 client -> Sending packet 5 (31 bytes) for connection 71ef965de3973627ceab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 58.65µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client Closing connection with error: Application error 0x0 (local) 2025/09/12 02:04:40 client -> Sending packet 6 (26 bytes) for connection 71ef965de3973627ceab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: bfeae665, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:04:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 02:04:40 client Connection 71ef965de3973627ceab closed. 2025/09/12 02:04:40 Requesting https://server4:443/qwtunmmbiv. 2025/09/12 02:04:40 Increased receive buffer size to 14336 kiB 2025/09/12 02:04:40 Increased send buffer size to 14336 kiB 2025/09/12 02:04:40 Setting DF for IPv4 and IPv6. 2025/09/12 02:04:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:04:40 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:04:40 Created qlog file: /logs/qlog/171ce4970e6d2963718e45.sqlog 2025/09/12 02:04:40 client Starting new connection to server4 ([::]:46613 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 171ce4970e6d2963718e45, version v1 2025/09/12 02:04:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 02:04:40 client -> Sending packet 0 (1280 bytes) for connection 171ce4970e6d2963718e45, Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: 171ce4970e6d2963718e45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:04:40 client -> Sending packet 1 (1280 bytes) for connection 171ce4970e6d2963718e45, Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: 171ce4970e6d2963718e45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 1237, Data length: 477, Offset + Data length: 1714} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:04:40 client <- Reading packet 0 (37 bytes) for connection (empty), Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4823c119, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:04:40 client Received first packet. Switching destination connection ID to: 4823c119 2025/09/12 02:04:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client newly acked packets (1): [0] 2025/09/12 02:04:40 client updated RTT: 31.969077ms (σ: 15.984538ms) 2025/09/12 02:04:40 client <- Reading packet 1 (1280 bytes) for connection (empty), Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4823c119, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:04:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client newly acked packets (1): [1] 2025/09/12 02:04:40 client updated RTT: 32.237ms (σ: 12.524ms) 2025/09/12 02:04:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 1184, Offset + Data length: 1184} 2025/09/12 02:04:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client -> Sending packet 2 (1280 bytes) for connection 171ce4970e6d2963718e45, Initial 2025/09/12 02:04:40 client Long Header{Type: Initial, DestConnectionID: 4823c119, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client Parsed a coalesced packet. Part 1: 201 bytes. Remaining: 91 bytes. 2025/09/12 02:04:40 client <- Reading packet 0 (201 bytes) for connection (empty), Handshake 2025/09/12 02:04:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4823c119, PacketNumber: 0, PacketNumberLen: 2, Length: 188, Version: v1} 2025/09/12 02:04:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 166, Offset + Data length: 166} 2025/09/12 02:04:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:04:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 171ce4970e6d2963718e45, InitialSourceConnectionID: 4823c119, InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, StatelessResetToken: 0xba02f9acc82a55838e9bb23c584e5e1c, EnableResetStreamAt: false} 2025/09/12 02:04:40 client <- Reading packet 0 (91 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59f59136, StatelessResetToken: 0x5ee0f6b1f43fd62ec2683fddfbac67de} 2025/09/12 02:04:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5cca52d1, StatelessResetToken: 0x415d982fcc336db9481732dd2b4fa87e} 2025/09/12 02:04:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f168feb7, StatelessResetToken: 0x5695f7a50c6c09f8e3766fb76baeea29} 2025/09/12 02:04:40 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:04:40 client -> Sending packet 0 (119 bytes) for connection 171ce4970e6d2963718e45, Handshake 2025/09/12 02:04:40 client Long Header{Type: Handshake, DestConnectionID: 5cca52d1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:04:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:04:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:04:40 client Dropping Initial keys. 2025/09/12 02:04:40 client -> Sending packet 1 (29 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 577.733µs} 2025/09/12 02:04:40 client <- Reading packet 1 (296 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 416µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client Peer doesn't await address validation any longer. 2025/09/12 02:04:40 client newly acked packets (1): [0] 2025/09/12 02:04:40 client Canceling loss detection timer. 2025/09/12 02:04:40 client Dropping Handshake keys. 2025/09/12 02:04:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:04:40 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:04:40 client <- &wire.NewTokenFrame{Token: 0xe5a9d8d39f3a5532eee464da8c068f0bd792c751075b9063d255538c4f724f40e1d0f2e607ab405e7d53dca3f6e0d331fdb5bd0e9fd587014b81748988b4de54c9f3cdf8baa8ded78c15ed99e0233c519e7c671f128f9a069a46f7} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 2 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1259, Offset + Data length: 1259} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client -> Sending packet 2 (31 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 63.649µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client <- Reading packet 3 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1259, Data length: 1257, Offset + Data length: 2516} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 4 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2516, Data length: 1257, Offset + Data length: 3773} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client -> Sending packet 3 (31 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 34.935µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client <- Reading packet 5 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3773, Data length: 1257, Offset + Data length: 5030} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 6 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5030, Data length: 1257, Offset + Data length: 6287} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client -> Sending packet 4 (31 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 41.728µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client <- Reading packet 7 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 6287, Data length: 1257, Offset + Data length: 7544} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 8 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7544, Data length: 1257, Offset + Data length: 8801} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client -> Sending packet 5 (31 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 34.905µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client <- Reading packet 9 (1280 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 8801, Data length: 1257, Offset + Data length: 10058} 2025/09/12 02:04:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:04:40 client <- Reading packet 10 (205 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 10058, Data length: 182, Offset + Data length: 10240} 2025/09/12 02:04:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:04:40 client <- Reading packet 11 (23 bytes) for connection (empty), 1-RTT 2025/09/12 02:04:40 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 10240, Data length: 0, Offset + Data length: 10240} 2025/09/12 02:04:40 client -> Sending packet 6 (31 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, DelayTime: 62.497µs, ECT0: 10, ECT1: 0, CE: 0} 2025/09/12 02:04:40 client Closing connection with error: Application error 0x0 (local) 2025/09/12 02:04:40 client -> Sending packet 7 (26 bytes) for connection 171ce4970e6d2963718e45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:04:40 client Short Header{DestConnectionID: 5cca52d1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:04:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:04:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 02:04:40 client Connection 171ce4970e6d2963718e45 closed.