2025/04/30 10:34:33 Requesting https://server4:443/pdsqpsjdvd. 2025/04/30 10:34:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:33 Increased send buffer size to 14336 kiB 2025/04/30 10:34:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:33 Created qlog file: /logs/qlog/2b36316b1dc4ccc34cabec4519fa.sqlog 2025/04/30 10:34:33 client Starting new connection to server4 ([::]:45203 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2b36316b1dc4ccc34cabec4519fa, version v1 2025/04/30 10:34:33 Adding connection ID (empty). 2025/04/30 10:34:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:33 client -> Sending packet 0 (1280 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Initial 2025/04/30 10:34:33 client Long Header{Type: Initial, DestConnectionID: 2b36316b1dc4ccc34cabec4519fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:34:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:34:33 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:34:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:34:33 client Received first packet. Switching destination connection ID to: 3e24907d90084cb3f2fded921dcc94e340bf00c0 2025/04/30 10:34:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 10:34:33 client newly acked packets (1): [0] 2025/04/30 10:34:33 client updated RTT: 38.157818ms (σ: 19.078909ms) 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:33 client Parsed a coalesced packet. Part 2: 1054 bytes. Remaining: 0 bytes. 2025/04/30 10:34:33 client <- Reading packet 1 (1054 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 1, PacketNumberLen: 1, Length: 1025, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 1004, Offset + Data length: 1004} 2025/04/30 10:34:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2b36316b1dc4ccc34cabec4519fa, InitialSourceConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:33 client -> Sending packet 1 (1280 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Initial 2025/04/30 10:34:33 client Long Header{Type: Initial, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:34:33 client -> Sending packet 0 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client Dropping Initial keys. 2025/04/30 10:34:33 client <- Reading packet 2 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 2, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 1004, Data length: 1149, Offset + Data length: 2153} 2025/04/30 10:34:33 client -> Sending packet 1 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 3 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 3, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 2153, Data length: 1149, Offset + Data length: 3302} 2025/04/30 10:34:33 client -> Sending packet 2 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 4 (240 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 4, PacketNumberLen: 1, Length: 211, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 3302, Data length: 189, Offset + Data length: 3491} 2025/04/30 10:34:33 client -> Sending packet 3 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client -> Sending packet 4 (49 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 10:34:33 client -> &wire.PingFrame{} 2025/04/30 10:34:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:34:33 client -> Sending packet 5 (49 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 10:34:33 client -> &wire.PingFrame{} 2025/04/30 10:34:33 client -> Sending packet 6 (49 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 10:34:33 client -> &wire.PingFrame{} 2025/04/30 10:34:33 client <- Reading packet 5 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 5, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 24µs} 2025/04/30 10:34:33 client Peer doesn't await address validation any longer. 2025/04/30 10:34:33 client newly acked packets (1): [6] 2025/04/30 10:34:33 client updated RTT: 37.348ms (σ: 15.925ms) 2025/04/30 10:34:33 client Canceling loss detection timer. 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 3491, Data length: 1144, Offset + Data length: 4635} 2025/04/30 10:34:33 client -> Sending packet 7 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 6 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 6, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 4635, Data length: 1149, Offset + Data length: 5784} 2025/04/30 10:34:33 client -> Sending packet 8 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 7 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 7, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 5784, Data length: 1149, Offset + Data length: 6933} 2025/04/30 10:34:33 client -> Sending packet 9 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 8 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 8, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 6933, Data length: 1149, Offset + Data length: 8082} 2025/04/30 10:34:33 client -> Sending packet 10 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 9 (1200 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 9, PacketNumberLen: 1, Length: 1171, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 8082, Data length: 1149, Offset + Data length: 9231} 2025/04/30 10:34:33 client -> Sending packet 11 (52 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client <- Reading packet 10 (772 bytes) for connection (empty), Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 10, PacketNumberLen: 1, Length: 743, Version: v1} 2025/04/30 10:34:33 client <- &wire.CryptoFrame{Offset: 9231, Data length: 721, Offset + Data length: 9952} 2025/04/30 10:34:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:33 client -> Sending packet 12 (91 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, Handshake 2025/04/30 10:34:33 client Long Header{Type: Handshake, DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, SrcConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:33 client -> Sending packet 0 (58 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:33 client Short Header{DestConnectionID: 3e24907d90084cb3f2fded921dcc94e340bf00c0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:33 client <- Reading packet 11 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:33 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:34:33 client newly acked packets (1): [0] 2025/04/30 10:34:33 client updated RTT: 36.645ms (σ: 13.349ms) 2025/04/30 10:34:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:34:33 client Canceling loss detection timer. 2025/04/30 10:34:33 client Dropping Handshake keys. 2025/04/30 10:34:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 72a7830cc3b6633f9949ccd4f70c2552e5573bff, StatelessResetToken: 0x4064a33d34ffe58c526c51246434437f} 2025/04/30 10:34:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b7fee70551bae273779792371d48f97b6b3a7456, StatelessResetToken: 0x71141f3a9ff5559c02f1936d7979643a} 2025/04/30 10:34:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22363adb7f17dcd448576473edcf03f9147ef32b, StatelessResetToken: 0x64124b4de9821853b477e196795b68bf} 2025/04/30 10:34:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1201, Offset + Data length: 1201} 2025/04/30 10:34:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:33 client -> Sending packet 1 (46 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:33 client Short Header{DestConnectionID: 72a7830cc3b6633f9949ccd4f70c2552e5573bff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 131.806µs} 2025/04/30 10:34:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:33 client <- Reading packet 12 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:33 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1201, Data length: 1326, Offset + Data length: 2527} 2025/04/30 10:34:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:33 client <- Reading packet 13 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:33 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:33 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2527, Data length: 1326, Offset + Data length: 3853} 2025/04/30 10:34:33 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:34:33 client -> Sending packet 2 (44 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:33 client Short Header{DestConnectionID: 72a7830cc3b6633f9949ccd4f70c2552e5573bff, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:33 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 11, DelayTime: 44.613µs} 2025/04/30 10:34:33 client <- Reading packet 14 (1291 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:33 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 3853, Data length: 1267, Offset + Data length: 5120} 2025/04/30 10:34:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:33 client -> Sending packet 3 (42 bytes) for connection 2b36316b1dc4ccc34cabec4519fa, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:33 client Short Header{DestConnectionID: 72a7830cc3b6633f9949ccd4f70c2552e5573bff, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:33 client Connection 2b36316b1dc4ccc34cabec4519fa closed.