2025/04/30 10:36:46 Requesting https://server4:443/otawuxxbbd. 2025/04/30 10:36:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:46 Increased send buffer size to 14336 kiB 2025/04/30 10:36:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:46 Created qlog file: /logs/qlog/67b0cdd72b213407724150e3.sqlog 2025/04/30 10:36:46 client Starting new connection to server4 ([::]:59867 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 67b0cdd72b213407724150e3, version v1 2025/04/30 10:36:46 Adding connection ID (empty). 2025/04/30 10:36:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:46 client -> Sending packet 0 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:46 client Long Header{Type: Initial, DestConnectionID: 67b0cdd72b213407724150e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:36:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:36:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:36:46 client -> Sending packet 1 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:46 client Long Header{Type: Initial, DestConnectionID: 67b0cdd72b213407724150e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:36:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:36:46 client -> Sending packet 2 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:46 client Long Header{Type: Initial, DestConnectionID: 67b0cdd72b213407724150e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:36:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:36:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:36:46 client -> Sending packet 3 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:46 client Long Header{Type: Initial, DestConnectionID: 67b0cdd72b213407724150e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:36:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:36:46 client -> Sending packet 4 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:46 client Long Header{Type: Initial, DestConnectionID: 67b0cdd72b213407724150e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:36:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:36:46 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:46 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:46 client Received first packet. Switching destination connection ID to: f0e1e9f585a6b2b9679e26d90d2510cd78a00720 2025/04/30 10:36:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 10:36:46 client newly acked packets (1): [4] 2025/04/30 10:36:46 client updated RTT: 33.94415ms (σ: 16.972075ms) 2025/04/30 10:36:46 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:47 client -> Sending packet 5 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:47 client Long Header{Type: Initial, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:47 client -> &wire.PingFrame{} 2025/04/30 10:36:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:36:48 client -> Sending packet 6 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:48 client Long Header{Type: Initial, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:48 client -> &wire.PingFrame{} 2025/04/30 10:36:48 client -> Sending packet 7 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:48 client Long Header{Type: Initial, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:48 client -> &wire.PingFrame{} 2025/04/30 10:36:48 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:36:48 client <- Reading packet 4 (56 bytes) for connection (empty), Initial 2025/04/30 10:36:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:36:48 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 10:36:48 client newly acked packets (1): [7] 2025/04/30 10:36:48 client updated RTT: 33.95ms (σ: 12.741ms) 2025/04/30 10:36:48 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:36:48 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:48 client Queueing packet (751 bytes) for later decryption 2025/04/30 10:36:48 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:36:49 client -> Sending packet 8 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:49 client Long Header{Type: Initial, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:49 client -> &wire.PingFrame{} 2025/04/30 10:36:49 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:36:49 client <- Reading packet 7 (56 bytes) for connection (empty), Initial 2025/04/30 10:36:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:36:49 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 112µs} 2025/04/30 10:36:49 client newly acked packets (1): [8] 2025/04/30 10:36:49 client updated RTT: 33.837ms (σ: 9.78ms) 2025/04/30 10:36:49 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:36:50 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:51 client Parsed a coalesced packet. Part 1: 153 bytes. Remaining: 1047 bytes. 2025/04/30 10:36:51 client <- Reading packet 8 (153 bytes) for connection (empty), Initial 2025/04/30 10:36:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 10:36:51 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1.752152s} 2025/04/30 10:36:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:51 client Queueing packet (1047 bytes) for later decryption 2025/04/30 10:36:51 client -> Sending packet 9 (1280 bytes) for connection 67b0cdd72b213407724150e3, Initial 2025/04/30 10:36:51 client Long Header{Type: Initial, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:51 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:36:51 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:51 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:36:51 client <- Reading packet 5 (751 bytes) for connection (empty), Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, PacketNumber: 5, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:36:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:36:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 67b0cdd72b213407724150e3, InitialSourceConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:51 client <- Reading packet 6 (50 bytes) for connection (empty), Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, PacketNumber: 6, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:36:51 client <- &wire.PingFrame{} 2025/04/30 10:36:51 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:51 client Dropping %!s(logging.PacketType=5) packet (1047 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:51 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:51 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:51 client -> Sending packet 0 (91 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:36:51 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:51 client Dropping Initial keys. 2025/04/30 10:36:51 client -> Sending packet 0 (58 bytes) for connection 67b0cdd72b213407724150e3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:51 client Short Header{DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:36:51 client -> Sending packet 1 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:51 client -> Sending packet 2 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:36:51 client -> Sending packet 3 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:51 client -> Sending packet 4 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:36:51 client -> Sending packet 5 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:51 client -> Sending packet 6 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:51 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:52 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:52 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 10:36:52 client -> Sending packet 7 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:52 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:52 client -> Sending packet 8 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:52 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 5 2025/04/30 10:36:53 client -> Sending packet 9 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:53 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:53 client -> Sending packet 10 (86 bytes) for connection 67b0cdd72b213407724150e3, Handshake 2025/04/30 10:36:53 client Long Header{Type: Handshake, DestConnectionID: f0e1e9f585a6b2b9679e26d90d2510cd78a00720, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:54 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:54 client <- Reading packet 11 (1176 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:54 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.485056s} 2025/04/30 10:36:54 client Peer doesn't await address validation any longer. 2025/04/30 10:36:54 client newly acked packets (1): [0] 2025/04/30 10:36:54 client updated RTT: 466.191ms (σ: 872.043ms) 2025/04/30 10:36:54 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:54 client Canceling loss detection timer. 2025/04/30 10:36:54 client Dropping Handshake keys. 2025/04/30 10:36:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 27de80be521ea1d091d1334932442db35067a41e, StatelessResetToken: 0x9ba2cb5b7533d4a3c2275cafa76c874a} 2025/04/30 10:36:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: db76d3893e3ca67a4a5e5b0d0066a659138ea905, StatelessResetToken: 0x6232d8093e89d151a7993cebb1e45d14} 2025/04/30 10:36:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 599da1a805314006be05c8639f7db0d178483076, StatelessResetToken: 0x4ffca703582b5058eabef48e22ca1d50} 2025/04/30 10:36:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:54 client -> Sending packet 1 (46 bytes) for connection 67b0cdd72b213407724150e3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:54 client Short Header{DestConnectionID: 27de80be521ea1d091d1334932442db35067a41e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:54 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 258.953µs} 2025/04/30 10:36:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:54 client -> Sending packet 2 (42 bytes) for connection 67b0cdd72b213407724150e3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:54 client Short Header{DestConnectionID: 27de80be521ea1d091d1334932442db35067a41e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:54 client Connection 67b0cdd72b213407724150e3 closed. 2025/04/30 10:36:54 Requesting https://server4:443/kxwwvrjsbl. 2025/04/30 10:36:54 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:54 Increased send buffer size to 14336 kiB 2025/04/30 10:36:54 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:54 Created qlog file: /logs/qlog/38b2649b4dbdf6a14af6d9ba9bd0ffda829a78.sqlog 2025/04/30 10:36:54 client Starting new connection to server4 ([::]:52825 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, version v1 2025/04/30 10:36:54 Adding connection ID (empty). 2025/04/30 10:36:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:54 client -> Sending packet 0 (1280 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Initial 2025/04/30 10:36:54 client Long Header{Type: Initial, DestConnectionID: 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:36:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:36:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:36:55 client -> Sending packet 1 (1280 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Initial 2025/04/30 10:36:55 client Long Header{Type: Initial, DestConnectionID: 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:36:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:36:55 client -> Sending packet 2 (1280 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Initial 2025/04/30 10:36:55 client Long Header{Type: Initial, DestConnectionID: 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:36:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:36:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:36:55 client -> Sending packet 3 (1280 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Initial 2025/04/30 10:36:55 client Long Header{Type: Initial, DestConnectionID: 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:36:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:36:55 client -> Sending packet 4 (1280 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Initial 2025/04/30 10:36:55 client Long Header{Type: Initial, DestConnectionID: 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:36:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:36:56 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:36:56 client <- Reading packet 2 (149 bytes) for connection (empty), Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:36:56 client Received first packet. Switching destination connection ID to: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.000584s} 2025/04/30 10:36:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:36:56 client -> Sending packet 5 (1280 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:36:56 client <- Reading packet 4 (758 bytes) for connection (empty), Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, PacketNumber: 4, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:36:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:36:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, InitialSourceConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:56 client -> Sending packet 0 (91 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client Dropping Initial keys. 2025/04/30 10:36:56 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:56 client -> Sending packet 0 (58 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client <- Reading packet 6 (50 bytes) for connection (empty), Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, PacketNumber: 6, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:36:56 client <- &wire.PingFrame{} 2025/04/30 10:36:56 client -> Sending packet 1 (54 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s} 2025/04/30 10:36:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:36:56 client -> Sending packet 2 (86 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client -> Sending packet 3 (86 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 0c4e2a88db52f10fb51503e93b5e4d356a9a9155, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client <- Reading packet 7 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ab61660682b24907b4ccd1c8f57621c746ab49af, StatelessResetToken: 0xbe9fdfa86f33398e535a0f9d75479ef6} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 60de1484253e7f3d7b7d37d073bed6d13f838bee, StatelessResetToken: 0x6ffbec8965b9974eb4da61e4756a1a12} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1441f8da11d68e5a7bee286ee506b55bc4dd937f, StatelessResetToken: 0x47d35b66e532aa93d4e36603257c55dc} 2025/04/30 10:36:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:56 client Dropping Handshake keys. 2025/04/30 10:36:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:56 client -> Sending packet 2 (65 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: ab61660682b24907b4ccd1c8f57621c746ab49af, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 121.447µs} 2025/04/30 10:36:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client -> Sending packet 3 (60 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: ab61660682b24907b4ccd1c8f57621c746ab49af, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client -> Sending packet 4 (1315 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: ab61660682b24907b4ccd1c8f57621c746ab49af, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.PingFrame{} 2025/04/30 10:36:56 client <- Reading packet 8 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 176µs} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 629e1535cac852a71048c549e90d4d773e9e40e8, StatelessResetToken: 0x1ece80196f382e57540cb29cd5f56100} 2025/04/30 10:36:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:56 client -> Sending packet 5 (42 bytes) for connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: ab61660682b24907b4ccd1c8f57621c746ab49af, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:56 client Connection 38b2649b4dbdf6a14af6d9ba9bd0ffda829a78 closed. 2025/04/30 10:36:56 Requesting https://server4:443/exfypyywby. 2025/04/30 10:36:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:56 Increased send buffer size to 14336 kiB 2025/04/30 10:36:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:56 Created qlog file: /logs/qlog/925bef4c256e33e27722f615ac6a61b7c98b.sqlog 2025/04/30 10:36:56 client Starting new connection to server4 ([::]:47622 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 925bef4c256e33e27722f615ac6a61b7c98b, version v1 2025/04/30 10:36:56 Adding connection ID (empty). 2025/04/30 10:36:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:56 client -> Sending packet 0 (1280 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: 925bef4c256e33e27722f615ac6a61b7c98b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:36:56 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:36:56 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:36:56 client Received first packet. Switching destination connection ID to: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:36:56 client newly acked packets (1): [0] 2025/04/30 10:36:56 client updated RTT: 32.998848ms (σ: 16.499424ms) 2025/04/30 10:36:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 298 bytes. 2025/04/30 10:36:56 client <- Reading packet 1 (756 bytes) for connection (empty), Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, PacketNumber: 1, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:36:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:36:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 925bef4c256e33e27722f615ac6a61b7c98b, InitialSourceConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:56 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client Dropping Initial keys. 2025/04/30 10:36:56 client -> Sending packet 1 (110 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:36:56 client Short Header{DestConnectionID: 2cc0b792d80f9ffccae4004eff20a5d9c528e1a1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, StatelessResetToken: 0x06b79dd10d0c158eed0148d0d188c816} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 90623d1ab452e0aa68ac46fa353fc167c6f508f4, StatelessResetToken: 0xf5afcaf8526bbda9c4131da662fac002} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 167aaef2276dca89037b625d3df03bbe78287f0b, StatelessResetToken: 0x91e193dab8f961fc6723b10ca276a283} 2025/04/30 10:36:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:56 client Dropping Handshake keys. 2025/04/30 10:36:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:56 client -> Sending packet 1 (46 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 88.856µs} 2025/04/30 10:36:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:56 client -> Sending packet 3 (58 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client Skipping packet number 2 2025/04/30 10:36:56 client -> Sending packet 4 (41 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:56 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.PingFrame{} 2025/04/30 10:36:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:56 client Sending ACK because the ACK timer expired. 2025/04/30 10:36:56 client -> Sending packet 5 (45 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.247975ms} 2025/04/30 10:36:56 client <- Reading packet 4 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 80µs} 2025/04/30 10:36:56 client newly acked packets (1): [4] 2025/04/30 10:36:56 client updated RTT: 32.763ms (σ: 12.843ms) 2025/04/30 10:36:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:56 client setting loss timer for packet 3 (1-RTT) to 36.858375ms (in 2025-04-30 10:36:56.626734943 +0000 UTC m=+10.318248514) 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 7c8971a5c72ff95bb2d11da2b6d3ad933fc429b8, StatelessResetToken: 0xd13909270a550dd7190c16f73ba996f9} 2025/04/30 10:36:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:56 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:36:56.626734943 +0000 UTC m=+10.318248514 2025/04/30 10:36:56 client lost packet 3 (time threshold) 2025/04/30 10:36:56 client Canceling loss detection timer. 2025/04/30 10:36:56 client -> Sending packet 6 (64 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 6.344271ms} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client <- Reading packet 5 (1052 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 160µs} 2025/04/30 10:36:56 client newly acked packets (1): [6] 2025/04/30 10:36:56 client updated RTT: 32.616ms (σ: 9.924ms) 2025/04/30 10:36:56 client Canceling loss detection timer. 2025/04/30 10:36:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:56 client Ignoring all packets below 5. 2025/04/30 10:36:56 client -> Sending packet 7 (1315 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.PingFrame{} 2025/04/30 10:36:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:56 client -> Sending packet 8 (42 bytes) for connection 925bef4c256e33e27722f615ac6a61b7c98b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 4f13dcf752f6aff6b947836fc20ce850aa58a7d9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:56 client Connection 925bef4c256e33e27722f615ac6a61b7c98b closed. 2025/04/30 10:36:56 Requesting https://server4:443/ogjbfadljd. 2025/04/30 10:36:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:56 Increased send buffer size to 14336 kiB 2025/04/30 10:36:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:56 Created qlog file: /logs/qlog/8eb9ab4a8a765c9704938f.sqlog 2025/04/30 10:36:56 client Starting new connection to server4 ([::]:42524 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8eb9ab4a8a765c9704938f, version v1 2025/04/30 10:36:56 Adding connection ID (empty). 2025/04/30 10:36:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:56 client -> Sending packet 0 (1280 bytes) for connection 8eb9ab4a8a765c9704938f, Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: 8eb9ab4a8a765c9704938f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:36:56 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:36:56 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:36:56 client Received first packet. Switching destination connection ID to: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/04/30 10:36:56 client newly acked packets (1): [0] 2025/04/30 10:36:56 client updated RTT: 33.274381ms (σ: 16.63719ms) 2025/04/30 10:36:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:36:56 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:36:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:36:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8eb9ab4a8a765c9704938f, InitialSourceConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:56 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8eb9ab4a8a765c9704938f 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client Dropping Initial keys. 2025/04/30 10:36:56 client -> Sending packet 1 (52 bytes) for connection 8eb9ab4a8a765c9704938f, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:36:56 client -> Sending packet 0 (58 bytes) for connection 8eb9ab4a8a765c9704938f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:36:56 client -> Sending packet 2 (86 bytes) for connection 8eb9ab4a8a765c9704938f, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client -> Sending packet 3 (86 bytes) for connection 8eb9ab4a8a765c9704938f, Handshake 2025/04/30 10:36:56 client Long Header{Type: Handshake, DestConnectionID: 1a7fdfbfc51b2b11162c83a3c2dbe0697b8a1a78, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:56 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 837b49c0c26f53a5eb763d2b91c8fea082e98fbe, StatelessResetToken: 0xd5474a0858a32ca9cedac12eb4e2495a} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 42576da6edd66243670040586822151e20899765, StatelessResetToken: 0x243d6ad744626f756021d5e47e487bbc} 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f3a0b39c630d7f87e5b6d4dcae693874739a9ff2, StatelessResetToken: 0x05fc015b5840d4a37bd8044c09c4c7b6} 2025/04/30 10:36:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:56 client Dropping Handshake keys. 2025/04/30 10:36:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:56 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:56 client -> Sending packet 2 (65 bytes) for connection 8eb9ab4a8a765c9704938f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 837b49c0c26f53a5eb763d2b91c8fea082e98fbe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112.57µs} 2025/04/30 10:36:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client -> Sending packet 3 (60 bytes) for connection 8eb9ab4a8a765c9704938f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 837b49c0c26f53a5eb763d2b91c8fea082e98fbe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:56 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:56 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:56 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 160µs} 2025/04/30 10:36:56 client newly acked packets (1): [3] 2025/04/30 10:36:56 client updated RTT: 33.087ms (σ: 12.851ms) 2025/04/30 10:36:56 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:56 client Canceling loss detection timer. 2025/04/30 10:36:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 5647044d86095877c0e772e3ec34275214b12a4e, StatelessResetToken: 0xfa4697a7cb2e4b61fd3a76b47d29826f} 2025/04/30 10:36:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:56 client -> Sending packet 4 (42 bytes) for connection 8eb9ab4a8a765c9704938f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:56 client Short Header{DestConnectionID: 837b49c0c26f53a5eb763d2b91c8fea082e98fbe, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:56 client Connection 8eb9ab4a8a765c9704938f closed. 2025/04/30 10:36:56 Requesting https://server4:443/cwycteqbro. 2025/04/30 10:36:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:56 Increased send buffer size to 14336 kiB 2025/04/30 10:36:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:56 Created qlog file: /logs/qlog/dda77528d9c351a3d3b4044d2aa180368290bba8.sqlog 2025/04/30 10:36:56 client Starting new connection to server4 ([::]:39708 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dda77528d9c351a3d3b4044d2aa180368290bba8, version v1 2025/04/30 10:36:56 Adding connection ID (empty). 2025/04/30 10:36:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:56 client -> Sending packet 0 (1280 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, Initial 2025/04/30 10:36:56 client Long Header{Type: Initial, DestConnectionID: dda77528d9c351a3d3b4044d2aa180368290bba8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:36:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:36:57 client -> Sending packet 1 (1280 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: dda77528d9c351a3d3b4044d2aa180368290bba8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:36:57 client -> Sending packet 2 (1280 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: dda77528d9c351a3d3b4044d2aa180368290bba8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:36:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:36:57 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:36:57 client Received first packet. Switching destination connection ID to: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 320µs} 2025/04/30 10:36:57 client newly acked packets (1): [2] 2025/04/30 10:36:57 client updated RTT: 34.344407ms (σ: 17.172203ms) 2025/04/30 10:36:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Parsed a coalesced packet. Part 2: 759 bytes. Remaining: 295 bytes. 2025/04/30 10:36:57 client <- Reading packet 1 (759 bytes) for connection (empty), Handshake 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, PacketNumber: 1, PacketNumberLen: 1, Length: 730, Version: v1} 2025/04/30 10:36:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:36:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dda77528d9c351a3d3b4044d2aa180368290bba8, InitialSourceConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:57 client Dropping %!s(logging.PacketType=5) packet (295 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:57 client Dropping Initial keys. 2025/04/30 10:36:57 client -> Sending packet 1 (52 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, Handshake 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:36:57 client -> Sending packet 0 (58 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:36:57 client -> Sending packet 2 (86 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, Handshake 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:57 client -> Sending packet 3 (86 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, Handshake 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: 25d7242a7a2f0cc180fb0ac186b18739138ee6f3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:57 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eeebdaae3bac6a41899ca35188781057dc97587b, StatelessResetToken: 0xe4c5f9f33dcbc2244c12fe229fec32b0} 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2749fe1e927f5821297d135e58bfdb1cf9e9206c, StatelessResetToken: 0xc06b7026dc7f3d38dba7b8a639c9685e} 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 35942af51cd65ba1a7b735b7105f265e2236cb1b, StatelessResetToken: 0x4b9d8f83e63f573b0826794a04f6df59} 2025/04/30 10:36:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:57 client Dropping Handshake keys. 2025/04/30 10:36:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:57 client -> Sending packet 2 (65 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: eeebdaae3bac6a41899ca35188781057dc97587b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 163.465µs} 2025/04/30 10:36:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:57 client -> Sending packet 3 (60 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: eeebdaae3bac6a41899ca35188781057dc97587b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:57 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 128µs} 2025/04/30 10:36:57 client newly acked packets (1): [3] 2025/04/30 10:36:57 client updated RTT: 34.027ms (σ: 13.511ms) 2025/04/30 10:36:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:57 client Canceling loss detection timer. 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 3e61382cd661f77724a24c7a956368c9d7889468, StatelessResetToken: 0x28f88e55cd67908e61d590a3ab519a0a} 2025/04/30 10:36:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:57 client -> Sending packet 4 (42 bytes) for connection dda77528d9c351a3d3b4044d2aa180368290bba8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:57 client Short Header{DestConnectionID: eeebdaae3bac6a41899ca35188781057dc97587b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:57 client Connection dda77528d9c351a3d3b4044d2aa180368290bba8 closed. 2025/04/30 10:36:57 Requesting https://server4:443/vhlyvvegfz. 2025/04/30 10:36:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:57 Increased send buffer size to 14336 kiB 2025/04/30 10:36:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:57 Created qlog file: /logs/qlog/d67db8e398929fbbeaa7.sqlog 2025/04/30 10:36:57 client Starting new connection to server4 ([::]:37761 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d67db8e398929fbbeaa7, version v1 2025/04/30 10:36:57 Adding connection ID (empty). 2025/04/30 10:36:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:57 client -> Sending packet 0 (1280 bytes) for connection d67db8e398929fbbeaa7, Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: d67db8e398929fbbeaa7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:36:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:36:57 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:36:57 client Received first packet. Switching destination connection ID to: 6bd3c129d902f4de89a21dd7a654cb4202278ac2 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/04/30 10:36:57 client newly acked packets (1): [0] 2025/04/30 10:36:57 client updated RTT: 33.167974ms (σ: 16.583987ms) 2025/04/30 10:36:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:36:57 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:36:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:36:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d67db8e398929fbbeaa7, InitialSourceConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:57 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d67db8e398929fbbeaa7 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:57 client Dropping Initial keys. 2025/04/30 10:36:57 client -> Sending packet 1 (52 bytes) for connection d67db8e398929fbbeaa7, Handshake 2025/04/30 10:36:57 client Long Header{Type: Handshake, DestConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:36:57 client -> Sending packet 0 (58 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: 6bd3c129d902f4de89a21dd7a654cb4202278ac2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:57 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, StatelessResetToken: 0xb2799a38a33d94ff620f26cb70c98686} 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 385fe514e7701470ad6797a08fce00139838dae1, StatelessResetToken: 0xe7f942dbed413301eefebd3f67a1dbda} 2025/04/30 10:36:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84bd4ca7abd1f5b9ce9928b8813ef9d6353aaff8, StatelessResetToken: 0x611240c8c34690c6fc3ae8d2c6294030} 2025/04/30 10:36:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:57 client Dropping Handshake keys. 2025/04/30 10:36:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:57 client -> Sending packet 1 (46 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 93.785µs} 2025/04/30 10:36:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:57 client -> Sending packet 3 (58 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:57 client Skipping packet number 2 2025/04/30 10:36:57 client -> Sending packet 4 (41 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:57 client <- Reading packet 4 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112.4ms} 2025/04/30 10:36:57 client <- &wire.PingFrame{} 2025/04/30 10:36:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:36:57 client -> Sending packet 5 (46 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 110.709µs} 2025/04/30 10:36:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:36:57 client -> Sending packet 7 (58 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:57 client Skipping packet number 6 2025/04/30 10:36:57 client -> Sending packet 8 (41 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:57 client -> Sending packet 9 (1315 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.PingFrame{} 2025/04/30 10:36:57 client <- Reading packet 6 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:57 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 224.592ms} 2025/04/30 10:36:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:36:57 client <- Reading packet 7 (29 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 224.768ms} 2025/04/30 10:36:57 client <- &wire.PingFrame{} 2025/04/30 10:36:57 client -> Sending packet 10 (48 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 130.924µs} 2025/04/30 10:36:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:57 client -> Sending packet 11 (42 bytes) for connection d67db8e398929fbbeaa7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:57 client Short Header{DestConnectionID: e9928a786a31ca2e0804c69e76c48212d18e4418, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:57 client Connection d67db8e398929fbbeaa7 closed. 2025/04/30 10:36:57 Requesting https://server4:443/fuoxhevmgi. 2025/04/30 10:36:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:57 Increased send buffer size to 14336 kiB 2025/04/30 10:36:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:57 Created qlog file: /logs/qlog/ff6e7b1d89675eeef8229d40c28b.sqlog 2025/04/30 10:36:57 client Starting new connection to server4 ([::]:42107 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ff6e7b1d89675eeef8229d40c28b, version v1 2025/04/30 10:36:57 Adding connection ID (empty). 2025/04/30 10:36:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:57 client -> Sending packet 0 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: ff6e7b1d89675eeef8229d40c28b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:36:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:36:57 client -> Sending packet 1 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: ff6e7b1d89675eeef8229d40c28b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:36:57 client -> Sending packet 2 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: ff6e7b1d89675eeef8229d40c28b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:36:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:36:57 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:57 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:57 client Received first packet. Switching destination connection ID to: 9945e59d845fc923ef8f47d47d7441cbed394677 2025/04/30 10:36:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs} 2025/04/30 10:36:57 client newly acked packets (1): [2] 2025/04/30 10:36:57 client updated RTT: 33.997259ms (σ: 16.998629ms) 2025/04/30 10:36:57 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:58 client -> Sending packet 3 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:58 client -> &wire.PingFrame{} 2025/04/30 10:36:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:36:58 client -> Sending packet 4 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:58 client -> &wire.PingFrame{} 2025/04/30 10:36:58 client -> Sending packet 5 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:58 client -> &wire.PingFrame{} 2025/04/30 10:36:58 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:58 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs} 2025/04/30 10:36:58 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:58 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:58 client <- Reading packet 5 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 10:36:58 client newly acked packets (1): [5] 2025/04/30 10:36:58 client updated RTT: 34ms (σ: 12.755ms) 2025/04/30 10:36:58 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:58 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:36:58 client <- Reading packet 6 (151 bytes) for connection (empty), Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 151.512ms} 2025/04/30 10:36:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:36:58 client -> Sending packet 6 (1280 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:36:58 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:58 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:58 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:58 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:36:58 client <- Reading packet 7 (52 bytes) for connection (empty), Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 136µs} 2025/04/30 10:36:58 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:58 client <- Reading packet 8 (753 bytes) for connection (empty), Handshake 2025/04/30 10:36:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, PacketNumber: 8, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:36:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:36:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ff6e7b1d89675eeef8229d40c28b, InitialSourceConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:58 client -> Sending packet 0 (91 bytes) for connection ff6e7b1d89675eeef8229d40c28b, Handshake 2025/04/30 10:36:58 client Long Header{Type: Handshake, DestConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:36:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:58 client Dropping Initial keys. 2025/04/30 10:36:58 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:58 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:58 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:58 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:58 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:58 client -> Sending packet 0 (58 bytes) for connection ff6e7b1d89675eeef8229d40c28b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:58 client Short Header{DestConnectionID: 9945e59d845fc923ef8f47d47d7441cbed394677, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:58 client <- Reading packet 9 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:58 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 10:36:58 client Peer doesn't await address validation any longer. 2025/04/30 10:36:58 client newly acked packets (1): [0] 2025/04/30 10:36:58 client updated RTT: 33.765ms (σ: 10.035ms) 2025/04/30 10:36:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:58 client Canceling loss detection timer. 2025/04/30 10:36:58 client Dropping Handshake keys. 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c2e11323c3e261b659d63cbff6d6c3a3c35be62, StatelessResetToken: 0xcd7b0f7f3ff7f23f358c12006084c1c0} 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: de527ddc6fa49836fdbc684250043adf26af7839, StatelessResetToken: 0xf67494469dc90405e2147e50306a944d} 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5be8480fadb0659e27c312ddfd83e8ae2beac3af, StatelessResetToken: 0x23213c9097cf4c0bfa284a0c1f8e5aaa} 2025/04/30 10:36:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:58 client -> Sending packet 1 (46 bytes) for connection ff6e7b1d89675eeef8229d40c28b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:58 client Short Header{DestConnectionID: 4c2e11323c3e261b659d63cbff6d6c3a3c35be62, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 244.276µs} 2025/04/30 10:36:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:58 client -> Sending packet 2 (42 bytes) for connection ff6e7b1d89675eeef8229d40c28b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:58 client Short Header{DestConnectionID: 4c2e11323c3e261b659d63cbff6d6c3a3c35be62, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:58 client Connection ff6e7b1d89675eeef8229d40c28b closed. 2025/04/30 10:36:58 Requesting https://server4:443/ppxcslswem. 2025/04/30 10:36:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:58 Increased send buffer size to 14336 kiB 2025/04/30 10:36:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:58 Created qlog file: /logs/qlog/6d03d9d45f1588782cc2.sqlog 2025/04/30 10:36:58 client Starting new connection to server4 ([::]:38205 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d03d9d45f1588782cc2, version v1 2025/04/30 10:36:58 Adding connection ID (empty). 2025/04/30 10:36:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:58 client -> Sending packet 0 (1280 bytes) for connection 6d03d9d45f1588782cc2, Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: 6d03d9d45f1588782cc2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:36:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:36:58 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:36:58 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:36:58 client Received first packet. Switching destination connection ID to: 3df374c88074b93cca3736ccde3b3aa7e39aabcd 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 10:36:58 client newly acked packets (1): [0] 2025/04/30 10:36:58 client updated RTT: 33.167803ms (σ: 16.583901ms) 2025/04/30 10:36:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:36:58 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:36:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:36:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:36:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d03d9d45f1588782cc2, InitialSourceConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:58 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d03d9d45f1588782cc2 2025/04/30 10:36:58 client Long Header{Type: Initial, DestConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:36:58 client Long Header{Type: Handshake, DestConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:58 client Dropping Initial keys. 2025/04/30 10:36:58 client -> Sending packet 1 (110 bytes) for connection 6d03d9d45f1588782cc2, Handshake 2025/04/30 10:36:58 client Long Header{Type: Handshake, DestConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:36:58 client Short Header{DestConnectionID: 3df374c88074b93cca3736ccde3b3aa7e39aabcd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:58 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:58 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, StatelessResetToken: 0x151ede14b15d6c760e7a00f4dec148cb} 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 66c33e2cbb1f627ff4219c6a2cd48c8580853c6e, StatelessResetToken: 0x9bc51ba595073665e7bf22a329a800d2} 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 82c89f44a899cb9f1ac0ea6d979f0cfe8f1be15d, StatelessResetToken: 0xd981a9f3299aca378c3ca19fe79a3ca3} 2025/04/30 10:36:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:58 client Dropping Handshake keys. 2025/04/30 10:36:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:58 client -> Sending packet 1 (46 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:58 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 152.063µs} 2025/04/30 10:36:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:58 client <- Reading packet 3 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:58 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96µs} 2025/04/30 10:36:58 client newly acked packets (1): [1] 2025/04/30 10:36:58 client updated RTT: 32.902ms (σ: 12.966ms) 2025/04/30 10:36:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:58 client lost packet 0 (time threshold) 2025/04/30 10:36:58 client Canceling loss detection timer. 2025/04/30 10:36:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: e133021fb5015f8d840175cdeb52e9e5eb60414d, StatelessResetToken: 0xd68127b033923daf74cd7b1f9ad6b031} 2025/04/30 10:36:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:58 client Ignoring all packets below 3. 2025/04/30 10:36:58 client -> Sending packet 2 (63 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:58 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 205.803µs} 2025/04/30 10:36:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:59 client -> Sending packet 4 (58 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:59 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:59 client -> Sending packet 5 (58 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:59 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:59 client <- Reading packet 5 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:59 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 101.536ms} 2025/04/30 10:36:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:59 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:36:59 client -> Sending packet 6 (1315 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:59 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:59 client -> &wire.PingFrame{} 2025/04/30 10:36:59 client -> Sending packet 7 (46 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:59 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:59 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 154.668µs} 2025/04/30 10:36:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:59 client -> Sending packet 8 (42 bytes) for connection 6d03d9d45f1588782cc2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:59 client Short Header{DestConnectionID: b945ee4715b5daa6b9a9750e97d981fe9c687aab, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:59 client Connection 6d03d9d45f1588782cc2 closed. 2025/04/30 10:36:59 Requesting https://server4:443/qkhvyolxil. 2025/04/30 10:36:59 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:59 Increased send buffer size to 14336 kiB 2025/04/30 10:36:59 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:59 Created qlog file: /logs/qlog/96df6b98473b6080416ffb1791c0.sqlog 2025/04/30 10:36:59 client Starting new connection to server4 ([::]:55407 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 96df6b98473b6080416ffb1791c0, version v1 2025/04/30 10:36:59 Adding connection ID (empty). 2025/04/30 10:36:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:59 client -> Sending packet 0 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: 96df6b98473b6080416ffb1791c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:36:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:36:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:36:59 client -> Sending packet 1 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: 96df6b98473b6080416ffb1791c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:36:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:36:59 client -> Sending packet 2 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: 96df6b98473b6080416ffb1791c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:36:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:36:59 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:36:59 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3401bda09326a615f069b7e5395512dfba194654, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:36:59 client Received first packet. Switching destination connection ID to: 3401bda09326a615f069b7e5395512dfba194654 2025/04/30 10:36:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 64µs} 2025/04/30 10:36:59 client newly acked packets (1): [2] 2025/04/30 10:36:59 client updated RTT: 34.481961ms (σ: 17.24098ms) 2025/04/30 10:36:59 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:59 client -> Sending packet 3 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:59 client -> &wire.PingFrame{} 2025/04/30 10:36:59 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:36:59 client -> Sending packet 4 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:59 client -> &wire.PingFrame{} 2025/04/30 10:36:59 client -> Sending packet 5 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:59 client -> &wire.PingFrame{} 2025/04/30 10:36:59 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:59 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3401bda09326a615f069b7e5395512dfba194654, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:59 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 112µs} 2025/04/30 10:36:59 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:00 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:37:00 client <- Reading packet 4 (151 bytes) for connection (empty), Initial 2025/04/30 10:37:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3401bda09326a615f069b7e5395512dfba194654, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:37:00 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 344.8ms} 2025/04/30 10:37:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:37:00 client -> Sending packet 6 (1280 bytes) for connection 96df6b98473b6080416ffb1791c0, Initial 2025/04/30 10:37:00 client Long Header{Type: Initial, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:37:00 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:00 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:00 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:00 client <- Reading packet 5 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3401bda09326a615f069b7e5395512dfba194654, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:00 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 152µs} 2025/04/30 10:37:00 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:00 client <- Reading packet 6 (753 bytes) for connection (empty), Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3401bda09326a615f069b7e5395512dfba194654, PacketNumber: 6, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:37:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:37:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 96df6b98473b6080416ffb1791c0, InitialSourceConnectionID: 3401bda09326a615f069b7e5395512dfba194654, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:00 client -> Sending packet 0 (91 bytes) for connection 96df6b98473b6080416ffb1791c0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:37:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client Dropping Initial keys. 2025/04/30 10:37:00 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:00 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:00 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:00 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:00 client -> Sending packet 0 (58 bytes) for connection 96df6b98473b6080416ffb1791c0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:00 client Short Header{DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:00 client -> Sending packet 1 (86 bytes) for connection 96df6b98473b6080416ffb1791c0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client -> Sending packet 2 (86 bytes) for connection 96df6b98473b6080416ffb1791c0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:37:00 client -> Sending packet 3 (86 bytes) for connection 96df6b98473b6080416ffb1791c0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client -> Sending packet 4 (86 bytes) for connection 96df6b98473b6080416ffb1791c0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 3401bda09326a615f069b7e5395512dfba194654, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client <- Reading packet 9 (1296 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:00 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440.784ms} 2025/04/30 10:37:00 client Peer doesn't await address validation any longer. 2025/04/30 10:37:00 client newly acked packets (1): [0] 2025/04/30 10:37:00 client updated RTT: 86.163ms (σ: 116.293ms) 2025/04/30 10:37:00 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:00 client Canceling loss detection timer. 2025/04/30 10:37:00 client Dropping Handshake keys. 2025/04/30 10:37:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df227370cc2d415331e87279b4555fc637ddfc5e, StatelessResetToken: 0x2d8d979aeb1b50378b9828a46ed75edc} 2025/04/30 10:37:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8aa3288d1f261f364fec5265a6abda6aa06c4663, StatelessResetToken: 0x7e1a380f31a471737f079fae89c2f41a} 2025/04/30 10:37:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce8fa20af4dee9aeb2687416a4fe28332e6e3c05, StatelessResetToken: 0x51974b594cec71c244e80d27abe0c6fd} 2025/04/30 10:37:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df227370cc2d415331e87279b4555fc637ddfc5e, StatelessResetToken: 0x2d8d979aeb1b50378b9828a46ed75edc} 2025/04/30 10:37:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8aa3288d1f261f364fec5265a6abda6aa06c4663, StatelessResetToken: 0x7e1a380f31a471737f079fae89c2f41a} 2025/04/30 10:37:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce8fa20af4dee9aeb2687416a4fe28332e6e3c05, StatelessResetToken: 0x51974b594cec71c244e80d27abe0c6fd} 2025/04/30 10:37:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:00 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:00 client <- Reading packet 10 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:00 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 441.056ms} 2025/04/30 10:37:00 client <- &wire.PingFrame{} 2025/04/30 10:37:00 client -> Sending packet 1 (46 bytes) for connection 96df6b98473b6080416ffb1791c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:00 client Short Header{DestConnectionID: df227370cc2d415331e87279b4555fc637ddfc5e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:00 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 365.421µs} 2025/04/30 10:37:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:00 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:00 client -> Sending packet 2 (42 bytes) for connection 96df6b98473b6080416ffb1791c0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:00 client Short Header{DestConnectionID: df227370cc2d415331e87279b4555fc637ddfc5e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:00 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:00 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:00 client Connection 96df6b98473b6080416ffb1791c0 closed. 2025/04/30 10:37:00 Requesting https://server4:443/zbiurosjmi. 2025/04/30 10:37:00 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:00 Increased send buffer size to 14336 kiB 2025/04/30 10:37:00 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:00 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:00 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:00 Created qlog file: /logs/qlog/ef8302ea42b4d9b2cde0.sqlog 2025/04/30 10:37:00 client Starting new connection to server4 ([::]:40113 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ef8302ea42b4d9b2cde0, version v1 2025/04/30 10:37:00 Adding connection ID (empty). 2025/04/30 10:37:00 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:00 client -> Sending packet 0 (1280 bytes) for connection ef8302ea42b4d9b2cde0, Initial 2025/04/30 10:37:00 client Long Header{Type: Initial, DestConnectionID: ef8302ea42b4d9b2cde0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:37:00 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:00 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:00 client Received first packet. Switching destination connection ID to: 932edd45d5e94c12b32b584cc60ad901ae4d1781 2025/04/30 10:37:00 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 10:37:00 client newly acked packets (1): [0] 2025/04/30 10:37:00 client updated RTT: 33.168333ms (σ: 16.584166ms) 2025/04/30 10:37:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:37:00 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:37:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:37:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ef8302ea42b4d9b2cde0, InitialSourceConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:00 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ef8302ea42b4d9b2cde0 2025/04/30 10:37:00 client Long Header{Type: Initial, DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client Dropping Initial keys. 2025/04/30 10:37:00 client -> Sending packet 1 (52 bytes) for connection ef8302ea42b4d9b2cde0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:00 client -> Sending packet 0 (58 bytes) for connection ef8302ea42b4d9b2cde0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:00 client Short Header{DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:00 client -> Sending packet 2 (86 bytes) for connection ef8302ea42b4d9b2cde0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:00 client -> Sending packet 3 (86 bytes) for connection ef8302ea42b4d9b2cde0, Handshake 2025/04/30 10:37:00 client Long Header{Type: Handshake, DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:01 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:01 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:01 client <- &wire.PingFrame{} 2025/04/30 10:37:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:01 client -> Sending packet 1 (44 bytes) for connection ef8302ea42b4d9b2cde0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:01 client Short Header{DestConnectionID: 932edd45d5e94c12b32b584cc60ad901ae4d1781, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 117.65µs} 2025/04/30 10:37:01 client <- Reading packet 4 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:01 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a586e4a190b23e63c3d9e49d8d98c4121d2750d5, StatelessResetToken: 0x194b7394cb041be00a449417dfcd9719} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa16b1b0935f0d3c826a783f515cf5a28543c59c, StatelessResetToken: 0xf85688e233acebe8b190e0639efc14c8} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f63e385dd862568380ffbb687f017425d2c24e5c, StatelessResetToken: 0x54f0f556e881960fcb3c5bda365db2fe} 2025/04/30 10:37:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:01 client Dropping Handshake keys. 2025/04/30 10:37:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:01 client -> Sending packet 3 (65 bytes) for connection ef8302ea42b4d9b2cde0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:01 client Short Header{DestConnectionID: a586e4a190b23e63c3d9e49d8d98c4121d2750d5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 123.7µs} 2025/04/30 10:37:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:01 client -> Sending packet 4 (60 bytes) for connection ef8302ea42b4d9b2cde0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:01 client Short Header{DestConnectionID: a586e4a190b23e63c3d9e49d8d98c4121d2750d5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:01 client <- Reading packet 5 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 112µs} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: a35d622c6a44f830cad3c4cd5e04ed06b065c779, StatelessResetToken: 0xddda8d24a339e3024630d20432a08bb0} 2025/04/30 10:37:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:01 client -> Sending packet 5 (42 bytes) for connection ef8302ea42b4d9b2cde0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:01 client Short Header{DestConnectionID: a586e4a190b23e63c3d9e49d8d98c4121d2750d5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:01 client Connection ef8302ea42b4d9b2cde0 closed. 2025/04/30 10:37:01 Requesting https://server4:443/hpwhbcpwio. 2025/04/30 10:37:01 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:01 Increased send buffer size to 14336 kiB 2025/04/30 10:37:01 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:01 Created qlog file: /logs/qlog/a9d24dce1841cfd82fde2ee52bc4ac3e.sqlog 2025/04/30 10:37:01 client Starting new connection to server4 ([::]:43802 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9d24dce1841cfd82fde2ee52bc4ac3e, version v1 2025/04/30 10:37:01 Adding connection ID (empty). 2025/04/30 10:37:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:01 client -> Sending packet 0 (1280 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, Initial 2025/04/30 10:37:01 client Long Header{Type: Initial, DestConnectionID: a9d24dce1841cfd82fde2ee52bc4ac3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:01 client -> Sending packet 1 (1280 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, Initial 2025/04/30 10:37:01 client Long Header{Type: Initial, DestConnectionID: a9d24dce1841cfd82fde2ee52bc4ac3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:01 client -> Sending packet 2 (1280 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, Initial 2025/04/30 10:37:01 client Long Header{Type: Initial, DestConnectionID: a9d24dce1841cfd82fde2ee52bc4ac3e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:01 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:01 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:01 client Received first packet. Switching destination connection ID to: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1 2025/04/30 10:37:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 360µs} 2025/04/30 10:37:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:01 client Parsed a coalesced packet. Part 2: 755 bytes. Remaining: 299 bytes. 2025/04/30 10:37:01 client <- Reading packet 1 (755 bytes) for connection (empty), Handshake 2025/04/30 10:37:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, PacketNumber: 1, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:37:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:37:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9d24dce1841cfd82fde2ee52bc4ac3e, InitialSourceConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:01 client Dropping %!s(logging.PacketType=5) packet (299 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e 2025/04/30 10:37:01 client Long Header{Type: Initial, DestConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:01 client Long Header{Type: Handshake, DestConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:01 client Dropping Initial keys. 2025/04/30 10:37:01 client -> Sending packet 1 (52 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, Handshake 2025/04/30 10:37:01 client Long Header{Type: Handshake, DestConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:01 client -> Sending packet 0 (58 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:01 client Short Header{DestConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:01 client -> Sending packet 2 (86 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, Handshake 2025/04/30 10:37:01 client Long Header{Type: Handshake, DestConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:01 client -> Sending packet 3 (86 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, Handshake 2025/04/30 10:37:01 client Long Header{Type: Handshake, DestConnectionID: 01bbb9f6dc5016677462758a7659bd04bd7eb5e1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:01 client <- Reading packet 5 (1296 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:01 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 389.408ms} 2025/04/30 10:37:01 client Peer doesn't await address validation any longer. 2025/04/30 10:37:01 client newly acked packets (1): [0] 2025/04/30 10:37:01 client updated RTT: 422.54843ms (σ: 211.274215ms) 2025/04/30 10:37:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:01 client Canceling loss detection timer. 2025/04/30 10:37:01 client Dropping Handshake keys. 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1d0e0ecc6bebd58264de9421a4ee77f2b4f9a0c, StatelessResetToken: 0x1485e180d6d4cb9be830f5ecfbeef8f6} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5a1631e1ea925235bdabb50cf2cd0441ff816b45, StatelessResetToken: 0x52224b4f8f88e5164cc8e6019eaba902} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 775534b5d6bd4bec7e3506ebc2115f94952aff2e, StatelessResetToken: 0xc7b79bcc180ab5a4b4e2204c30e76e30} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1d0e0ecc6bebd58264de9421a4ee77f2b4f9a0c, StatelessResetToken: 0x1485e180d6d4cb9be830f5ecfbeef8f6} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5a1631e1ea925235bdabb50cf2cd0441ff816b45, StatelessResetToken: 0x52224b4f8f88e5164cc8e6019eaba902} 2025/04/30 10:37:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 775534b5d6bd4bec7e3506ebc2115f94952aff2e, StatelessResetToken: 0xc7b79bcc180ab5a4b4e2204c30e76e30} 2025/04/30 10:37:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:01 client -> Sending packet 1 (46 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:01 client Short Header{DestConnectionID: c1d0e0ecc6bebd58264de9421a4ee77f2b4f9a0c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 263.051µs} 2025/04/30 10:37:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:01 client -> Sending packet 2 (42 bytes) for connection a9d24dce1841cfd82fde2ee52bc4ac3e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:01 client Short Header{DestConnectionID: c1d0e0ecc6bebd58264de9421a4ee77f2b4f9a0c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:01 client Connection a9d24dce1841cfd82fde2ee52bc4ac3e closed. 2025/04/30 10:37:01 Requesting https://server4:443/tghyxaksqf. 2025/04/30 10:37:01 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:01 Increased send buffer size to 14336 kiB 2025/04/30 10:37:01 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:01 Created qlog file: /logs/qlog/6de5113dddcb926c7e65b12a.sqlog 2025/04/30 10:37:01 client Starting new connection to server4 ([::]:39771 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6de5113dddcb926c7e65b12a, version v1 2025/04/30 10:37:01 Adding connection ID (empty). 2025/04/30 10:37:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:01 client -> Sending packet 0 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:01 client Long Header{Type: Initial, DestConnectionID: 6de5113dddcb926c7e65b12a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:37:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:02 client -> Sending packet 1 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: 6de5113dddcb926c7e65b12a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:37:02 client -> Sending packet 2 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: 6de5113dddcb926c7e65b12a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:37:02 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:02 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:02 client Received first packet. Switching destination connection ID to: d60db81d5153e1d19b974ab122e4f680de76a9a3 2025/04/30 10:37:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs} 2025/04/30 10:37:02 client newly acked packets (1): [2] 2025/04/30 10:37:02 client updated RTT: 34.241714ms (σ: 17.120857ms) 2025/04/30 10:37:02 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:02 client -> Sending packet 3 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:02 client -> &wire.PingFrame{} 2025/04/30 10:37:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:37:02 client -> Sending packet 4 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:02 client -> &wire.PingFrame{} 2025/04/30 10:37:02 client -> Sending packet 5 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:02 client -> &wire.PingFrame{} 2025/04/30 10:37:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:02 client Parsed a coalesced packet. Part 1: 153 bytes. Remaining: 1047 bytes. 2025/04/30 10:37:02 client <- Reading packet 4 (153 bytes) for connection (empty), Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 10:37:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 146.928ms} 2025/04/30 10:37:02 client newly acked packets (1): [5] 2025/04/30 10:37:02 client updated RTT: 52.551ms (σ: 49.461ms) 2025/04/30 10:37:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:02 client Queueing packet (1047 bytes) for later decryption 2025/04/30 10:37:02 client -> Sending packet 6 (1280 bytes) for connection 6de5113dddcb926c7e65b12a, Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:37:02 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:02 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:02 client <- Reading packet 5 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:02 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 96µs} 2025/04/30 10:37:02 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:03 client <- Reading packet 8 (50 bytes) for connection (empty), Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, PacketNumber: 8, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:37:03 client <- &wire.PingFrame{} 2025/04/30 10:37:03 client -> Sending packet 0 (52 bytes) for connection 6de5113dddcb926c7e65b12a, Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:03 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:37:03 client Dropping Initial keys. 2025/04/30 10:37:03 client -> Sending packet 1 (49 bytes) for connection 6de5113dddcb926c7e65b12a, Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 10:37:03 client -> &wire.PingFrame{} 2025/04/30 10:37:03 client <- Reading packet 9 (51 bytes) for connection (empty), Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80µs} 2025/04/30 10:37:03 client Peer doesn't await address validation any longer. 2025/04/30 10:37:03 client newly acked packets (1): [1] 2025/04/30 10:37:03 client updated RTT: 49.895ms (σ: 42.407ms) 2025/04/30 10:37:03 client Canceling loss detection timer. 2025/04/30 10:37:03 client <- Reading packet 10 (756 bytes) for connection (empty), Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, PacketNumber: 10, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:37:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 115.552ms} 2025/04/30 10:37:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:37:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6de5113dddcb926c7e65b12a, InitialSourceConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:03 client <- Reading packet 11 (53 bytes) for connection (empty), Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, PacketNumber: 11, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 115.784ms} 2025/04/30 10:37:03 client <- &wire.PingFrame{} 2025/04/30 10:37:03 client -> Sending packet 2 (91 bytes) for connection 6de5113dddcb926c7e65b12a, Handshake 2025/04/30 10:37:03 client Long Header{Type: Handshake, DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:37:03 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:37:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:03 client Dropping %!s(logging.PacketType=5) packet (1047 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:03 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:03 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:03 client -> Sending packet 0 (58 bytes) for connection 6de5113dddcb926c7e65b12a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:03 client Short Header{DestConnectionID: d60db81d5153e1d19b974ab122e4f680de76a9a3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:03 client <- Reading packet 12 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:03 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 10:37:03 client newly acked packets (1): [0] 2025/04/30 10:37:03 client updated RTT: 47.631ms (σ: 36.332ms) 2025/04/30 10:37:03 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:03 client Canceling loss detection timer. 2025/04/30 10:37:03 client Dropping Handshake keys. 2025/04/30 10:37:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0e7fc103e766d905c66b56a479eefd39cc8799a0, StatelessResetToken: 0xf5f0ee1cc41d89d08228cdbef3a0494e} 2025/04/30 10:37:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f7567f9bf614033b076f5abef8f88ddf8388dec4, StatelessResetToken: 0x633bd679e0f7ce86a760b9b0dcd4ac62} 2025/04/30 10:37:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7016225fceb9f9aa9262de44f241cffff4f8813d, StatelessResetToken: 0x2a9c4d52f1713e89ad578f57d9230ef2} 2025/04/30 10:37:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:03 client -> Sending packet 1 (46 bytes) for connection 6de5113dddcb926c7e65b12a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:03 client Short Header{DestConnectionID: 0e7fc103e766d905c66b56a479eefd39cc8799a0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:03 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 190.726µs} 2025/04/30 10:37:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:03 client -> Sending packet 2 (42 bytes) for connection 6de5113dddcb926c7e65b12a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:03 client Short Header{DestConnectionID: 0e7fc103e766d905c66b56a479eefd39cc8799a0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:03 client Connection 6de5113dddcb926c7e65b12a closed. 2025/04/30 10:37:03 Requesting https://server4:443/rwvcjkaebr. 2025/04/30 10:37:03 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:03 Increased send buffer size to 14336 kiB 2025/04/30 10:37:03 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:03 Created qlog file: /logs/qlog/bdca4c6a3ead1db823f23e61.sqlog 2025/04/30 10:37:03 client Starting new connection to server4 ([::]:39220 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bdca4c6a3ead1db823f23e61, version v1 2025/04/30 10:37:03 Adding connection ID (empty). 2025/04/30 10:37:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:03 client -> Sending packet 0 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:03 client Long Header{Type: Initial, DestConnectionID: bdca4c6a3ead1db823f23e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:37:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:03 client -> Sending packet 1 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:03 client Long Header{Type: Initial, DestConnectionID: bdca4c6a3ead1db823f23e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:37:03 client -> Sending packet 2 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:03 client Long Header{Type: Initial, DestConnectionID: bdca4c6a3ead1db823f23e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:37:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:37:04 client -> Sending packet 3 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:04 client Long Header{Type: Initial, DestConnectionID: bdca4c6a3ead1db823f23e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:37:04 client -> Sending packet 4 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:04 client Long Header{Type: Initial, DestConnectionID: bdca4c6a3ead1db823f23e61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:37:04 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:04 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:04 client Received first packet. Switching destination connection ID to: d2cd4b505955b72f115e465053b1a34c0b811066 2025/04/30 10:37:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 88µs} 2025/04/30 10:37:04 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:04 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:04 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 48µs} 2025/04/30 10:37:04 client newly acked packets (1): [4] 2025/04/30 10:37:04 client updated RTT: 33.971391ms (σ: 16.985695ms) 2025/04/30 10:37:04 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:04 client -> Sending packet 5 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:04 client Long Header{Type: Initial, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:04 client -> &wire.PingFrame{} 2025/04/30 10:37:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:37:05 client -> Sending packet 6 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:05 client Long Header{Type: Initial, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:05 client -> &wire.PingFrame{} 2025/04/30 10:37:05 client -> Sending packet 7 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:05 client Long Header{Type: Initial, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:05 client -> &wire.PingFrame{} 2025/04/30 10:37:05 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:05 client <- Reading packet 6 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:05 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 72µs} 2025/04/30 10:37:05 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:05 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:05 client <- Reading packet 7 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:05 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 56µs} 2025/04/30 10:37:05 client newly acked packets (1): [7] 2025/04/30 10:37:05 client updated RTT: 33.954ms (σ: 12.772ms) 2025/04/30 10:37:05 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:05 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:05 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:37:05 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:06 client -> Sending packet 8 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:06 client Long Header{Type: Initial, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:06 client -> &wire.PingFrame{} 2025/04/30 10:37:06 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:06 client <- Reading packet 10 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:06 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 88µs} 2025/04/30 10:37:06 client newly acked packets (1): [8] 2025/04/30 10:37:06 client updated RTT: 33.857ms (σ: 9.772ms) 2025/04/30 10:37:06 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:07 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:08 client Parsed a coalesced packet. Part 1: 58 bytes. Remaining: 1142 bytes. 2025/04/30 10:37:08 client <- Reading packet 12 (58 bytes) for connection (empty), Initial 2025/04/30 10:37:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 12, PacketNumberLen: 1, Length: 28, Version: v1} 2025/04/30 10:37:08 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1.94568s} 2025/04/30 10:37:08 client <- &wire.PingFrame{} 2025/04/30 10:37:08 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:37:08 client -> Sending packet 9 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:08 client Long Header{Type: Initial, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:08 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:37:08 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:08 client <- Reading packet 13 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, Token: (empty), PacketNumber: 13, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:08 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 152µs} 2025/04/30 10:37:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:08 client Queueing packet (1054 bytes) for later decryption 2025/04/30 10:37:08 client -> Sending packet 10 (1280 bytes) for connection bdca4c6a3ead1db823f23e61, Initial 2025/04/30 10:37:08 client Long Header{Type: Initial, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:08 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 2, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:37:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:08 client <- Reading packet 9 (50 bytes) for connection (empty), Handshake 2025/04/30 10:37:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, PacketNumber: 9, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:37:08 client <- &wire.PingFrame{} 2025/04/30 10:37:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:08 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:37:08 client <- Reading packet 14 (751 bytes) for connection (empty), Handshake 2025/04/30 10:37:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, PacketNumber: 14, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:37:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:37:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bdca4c6a3ead1db823f23e61, InitialSourceConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:08 client -> Sending packet 0 (93 bytes) for connection bdca4c6a3ead1db823f23e61, Handshake 2025/04/30 10:37:08 client Long Header{Type: Handshake, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 64, Version: v1} 2025/04/30 10:37:08 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 9, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 9, Smallest: 9}}, DelayTime: 0s} 2025/04/30 10:37:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:08 client Dropping Initial keys. 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1054 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client Dropping %!s(logging.PacketType=5) packet (1142 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:08 client -> Sending packet 0 (58 bytes) for connection bdca4c6a3ead1db823f23e61, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:08 client Short Header{DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:08 client -> Sending packet 1 (86 bytes) for connection bdca4c6a3ead1db823f23e61, Handshake 2025/04/30 10:37:08 client Long Header{Type: Handshake, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:08 client -> Sending packet 2 (86 bytes) for connection bdca4c6a3ead1db823f23e61, Handshake 2025/04/30 10:37:08 client Long Header{Type: Handshake, DestConnectionID: d2cd4b505955b72f115e465053b1a34c0b811066, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:08 client <- Reading packet 15 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:08 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f8c55074667361fd51b33a8300e8992c18bf7c9c, StatelessResetToken: 0xa45ceff94a7e08ca3ddef71bdd4eeb78} 2025/04/30 10:37:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53c11f781b2533ea9e76befc76f86777bafb6f19, StatelessResetToken: 0xb34fb7c86cfa7ea98a9874f7e7b6e616} 2025/04/30 10:37:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a755556cfda5a852760644c798f65ea4466f0f39, StatelessResetToken: 0xf53606c1680c2d915c35175796b9de3c} 2025/04/30 10:37:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:08 client Dropping Handshake keys. 2025/04/30 10:37:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:08 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:08 client -> Sending packet 2 (65 bytes) for connection bdca4c6a3ead1db823f23e61, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:08 client Short Header{DestConnectionID: f8c55074667361fd51b33a8300e8992c18bf7c9c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:08 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 127.839µs} 2025/04/30 10:37:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:08 client -> Sending packet 3 (60 bytes) for connection bdca4c6a3ead1db823f23e61, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:08 client Short Header{DestConnectionID: f8c55074667361fd51b33a8300e8992c18bf7c9c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:08 client <- Reading packet 16 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:08 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 32µs} 2025/04/30 10:37:08 client newly acked packets (1): [3] 2025/04/30 10:37:08 client updated RTT: 33.61ms (σ: 7.822ms) 2025/04/30 10:37:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:08 client Canceling loss detection timer. 2025/04/30 10:37:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 46c14d85c8f463fae50d3a58052ad4a4937f949b, StatelessResetToken: 0x599d839225841f72cd980f93034cee56} 2025/04/30 10:37:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:08 client -> Sending packet 4 (42 bytes) for connection bdca4c6a3ead1db823f23e61, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:08 client Short Header{DestConnectionID: f8c55074667361fd51b33a8300e8992c18bf7c9c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:08 client Connection bdca4c6a3ead1db823f23e61 closed. 2025/04/30 10:37:08 Requesting https://server4:443/gfuhnqmwll. 2025/04/30 10:37:08 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:08 Increased send buffer size to 14336 kiB 2025/04/30 10:37:08 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:08 Created qlog file: /logs/qlog/8bbb19f822d780d767055ea47f.sqlog 2025/04/30 10:37:08 client Starting new connection to server4 ([::]:37794 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8bbb19f822d780d767055ea47f, version v1 2025/04/30 10:37:08 Adding connection ID (empty). 2025/04/30 10:37:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:08 client -> Sending packet 0 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:08 client Long Header{Type: Initial, DestConnectionID: 8bbb19f822d780d767055ea47f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:37:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:37:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:09 client -> Sending packet 1 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: 8bbb19f822d780d767055ea47f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:37:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:37:09 client -> Sending packet 2 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: 8bbb19f822d780d767055ea47f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:37:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:37:09 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:09 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:09 client Received first packet. Switching destination connection ID to: bb6ac4d750f6576489bd2a5fa7284f0394a34f23 2025/04/30 10:37:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:09 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:09 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 10:37:09 client newly acked packets (1): [2] 2025/04/30 10:37:09 client updated RTT: 33.935894ms (σ: 16.967947ms) 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client -> Sending packet 3 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:09 client -> &wire.PingFrame{} 2025/04/30 10:37:09 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:09 client <- Reading packet 4 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 10:37:09 client newly acked packets (1): [3] 2025/04/30 10:37:09 client updated RTT: 33.79ms (σ: 13.014ms) 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client -> Sending packet 4 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:09 client -> &wire.PingFrame{} 2025/04/30 10:37:09 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:09 client <- Reading packet 5 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:37:09 client newly acked packets (1): [4] 2025/04/30 10:37:09 client updated RTT: 33.696ms (σ: 9.946ms) 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:37:09 client <- Reading packet 6 (149 bytes) for connection (empty), Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:37:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 184.224ms} 2025/04/30 10:37:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:09 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:37:09 client -> Sending packet 5 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:09 client Long Header{Type: Initial, DestConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:09 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:09 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:10 client -> Sending packet 6 (1280 bytes) for connection 8bbb19f822d780d767055ea47f, Initial 2025/04/30 10:37:10 client Long Header{Type: Initial, DestConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:10 client -> &wire.PingFrame{} 2025/04/30 10:37:10 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:10 client <- Reading packet 7 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:10 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 10:37:10 client newly acked packets (1): [6] 2025/04/30 10:37:10 client updated RTT: 33.616ms (σ: 7.618ms) 2025/04/30 10:37:10 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:10 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:10 client <- Reading packet 8 (752 bytes) for connection (empty), Handshake 2025/04/30 10:37:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, PacketNumber: 8, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:37:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:37:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8bbb19f822d780d767055ea47f, InitialSourceConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:10 client -> Sending packet 0 (91 bytes) for connection 8bbb19f822d780d767055ea47f, Handshake 2025/04/30 10:37:10 client Long Header{Type: Handshake, DestConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:37:10 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:37:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:10 client Dropping Initial keys. 2025/04/30 10:37:10 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:10 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:10 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:10 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:10 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:10 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:10 client -> Sending packet 0 (58 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:10 client Short Header{DestConnectionID: bb6ac4d750f6576489bd2a5fa7284f0394a34f23, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:10 client <- Reading packet 10 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:10 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, StatelessResetToken: 0xd2d96ce5257412b4ca7c184a5d5e24f2} 2025/04/30 10:37:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7ec7388f148abdae8b5193834d2d6a10340f643a, StatelessResetToken: 0xed26000cbe7c021c7dbfe01844c6055a} 2025/04/30 10:37:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 90cb46a09e16db7c60dacb5eac9453fc4fca3fbb, StatelessResetToken: 0xc65a20dd5371bbb5ff8df1f25fc0e8d6} 2025/04/30 10:37:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:10 client Dropping Handshake keys. 2025/04/30 10:37:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:10 client -> Sending packet 1 (46 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:10 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:10 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 172.862µs} 2025/04/30 10:37:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:11 client <- Reading packet 11 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:11 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96µs} 2025/04/30 10:37:11 client newly acked packets (1): [1] 2025/04/30 10:37:11 client updated RTT: 33.298ms (σ: 6.347ms) 2025/04/30 10:37:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:11 client lost packet 0 (time threshold) 2025/04/30 10:37:11 client Canceling loss detection timer. 2025/04/30 10:37:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: cd5e2e51132ccd57d68aca3025cbefc4e4df8a4c, StatelessResetToken: 0x291f8fbfaa7fcb2ef977d384c75a1661} 2025/04/30 10:37:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:11 client Ignoring all packets below 11. 2025/04/30 10:37:11 client -> Sending packet 2 (63 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 223.386µs} 2025/04/30 10:37:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:11 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:11 client -> Sending packet 4 (58 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:11 client -> Sending packet 5 (58 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:11 client <- Reading packet 14 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:11 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:11 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 41.424ms} 2025/04/30 10:37:11 client newly acked packets (1): [5] 2025/04/30 10:37:11 client updated RTT: 35.177ms (σ: 8.518ms) 2025/04/30 10:37:11 client Canceling loss detection timer. 2025/04/30 10:37:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:11 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:37:11 client -> Sending packet 6 (1315 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.PingFrame{} 2025/04/30 10:37:11 client -> Sending packet 7 (46 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 11, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 181.298µs} 2025/04/30 10:37:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:11 client -> Sending packet 8 (42 bytes) for connection 8bbb19f822d780d767055ea47f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 1ae0d0530f4518b0a2a654492cd3e134c6e0434e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:11 client Connection 8bbb19f822d780d767055ea47f closed. 2025/04/30 10:37:11 Requesting https://server4:443/mgzssvpeto. 2025/04/30 10:37:11 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:11 Increased send buffer size to 14336 kiB 2025/04/30 10:37:11 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:11 Created qlog file: /logs/qlog/4e0c652970493d8e9ece7b43a5.sqlog 2025/04/30 10:37:11 client Starting new connection to server4 ([::]:53083 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4e0c652970493d8e9ece7b43a5, version v1 2025/04/30 10:37:11 Adding connection ID (empty). 2025/04/30 10:37:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:11 client -> Sending packet 0 (1280 bytes) for connection 4e0c652970493d8e9ece7b43a5, Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: 4e0c652970493d8e9ece7b43a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:37:11 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:11 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:11 client Received first packet. Switching destination connection ID to: e2758a9d8f001e6054891fef1d6f37d838b72ff7 2025/04/30 10:37:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:37:11 client newly acked packets (1): [0] 2025/04/30 10:37:11 client updated RTT: 33.412468ms (σ: 16.706234ms) 2025/04/30 10:37:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:11 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 303 bytes. 2025/04/30 10:37:11 client <- Reading packet 1 (751 bytes) for connection (empty), Handshake 2025/04/30 10:37:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:37:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:37:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4e0c652970493d8e9ece7b43a5, InitialSourceConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:11 client Dropping %!s(logging.PacketType=5) packet (303 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4e0c652970493d8e9ece7b43a5 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:11 client Long Header{Type: Handshake, DestConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:11 client Dropping Initial keys. 2025/04/30 10:37:11 client -> Sending packet 1 (52 bytes) for connection 4e0c652970493d8e9ece7b43a5, Handshake 2025/04/30 10:37:11 client Long Header{Type: Handshake, DestConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:11 client -> Sending packet 0 (58 bytes) for connection 4e0c652970493d8e9ece7b43a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:11 client Short Header{DestConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:11 client -> Sending packet 2 (86 bytes) for connection 4e0c652970493d8e9ece7b43a5, Handshake 2025/04/30 10:37:11 client Long Header{Type: Handshake, DestConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:11 client -> Sending packet 3 (86 bytes) for connection 4e0c652970493d8e9ece7b43a5, Handshake 2025/04/30 10:37:11 client Long Header{Type: Handshake, DestConnectionID: e2758a9d8f001e6054891fef1d6f37d838b72ff7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:11 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 081e8599350847231ef8d7ba4f8a7cde5a362b92, StatelessResetToken: 0x1e846d9c8c15ca7b4ee8affc9a027ecf} 2025/04/30 10:37:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 73ad2b763db1b002e23d58f80455c21c4ce0907f, StatelessResetToken: 0x7b2067bf7a81f5ac0d83ebe51fd2619f} 2025/04/30 10:37:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6312a1540fb9fa9af5ae7bcae3f6420520616d0b, StatelessResetToken: 0xed06c4a69341edcd1fb5b005b8883f8e} 2025/04/30 10:37:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:11 client Dropping Handshake keys. 2025/04/30 10:37:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:11 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:11 client -> Sending packet 2 (65 bytes) for connection 4e0c652970493d8e9ece7b43a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 081e8599350847231ef8d7ba4f8a7cde5a362b92, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 179.174µs} 2025/04/30 10:37:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:11 client -> Sending packet 3 (60 bytes) for connection 4e0c652970493d8e9ece7b43a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 081e8599350847231ef8d7ba4f8a7cde5a362b92, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:11 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:11 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:11 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 200µs} 2025/04/30 10:37:11 client newly acked packets (1): [3] 2025/04/30 10:37:11 client updated RTT: 33.252ms (σ: 12.849ms) 2025/04/30 10:37:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:11 client Canceling loss detection timer. 2025/04/30 10:37:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 21e02155d156afdf1bf61373cdfb9bb276aac6f3, StatelessResetToken: 0xd0ae238a61a8ad3c3581e9aacda30052} 2025/04/30 10:37:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:11 client -> Sending packet 4 (42 bytes) for connection 4e0c652970493d8e9ece7b43a5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:11 client Short Header{DestConnectionID: 081e8599350847231ef8d7ba4f8a7cde5a362b92, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:11 client Connection 4e0c652970493d8e9ece7b43a5 closed. 2025/04/30 10:37:11 Requesting https://server4:443/imojywycnv. 2025/04/30 10:37:11 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:11 Increased send buffer size to 14336 kiB 2025/04/30 10:37:11 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:11 Created qlog file: /logs/qlog/1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5.sqlog 2025/04/30 10:37:11 client Starting new connection to server4 ([::]:37999 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, version v1 2025/04/30 10:37:11 Adding connection ID (empty). 2025/04/30 10:37:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:11 client -> Sending packet 0 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:11 client -> Sending packet 1 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:11 client -> Sending packet 2 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:37:11 client -> Sending packet 3 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:11 client -> Sending packet 4 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:37:11 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:11 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:11 client Received first packet. Switching destination connection ID to: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924 2025/04/30 10:37:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 10:37:11 client newly acked packets (1): [4] 2025/04/30 10:37:11 client updated RTT: 33.939905ms (σ: 16.969952ms) 2025/04/30 10:37:11 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:12 client -> Sending packet 5 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:12 client Long Header{Type: Initial, DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:12 client -> &wire.PingFrame{} 2025/04/30 10:37:12 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:12 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:12 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/04/30 10:37:12 client newly acked packets (1): [5] 2025/04/30 10:37:12 client updated RTT: 33.81ms (σ: 12.983ms) 2025/04/30 10:37:12 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:13 client -> Sending packet 6 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:13 client Long Header{Type: Initial, DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:13 client -> &wire.PingFrame{} 2025/04/30 10:37:13 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:13 client <- Reading packet 5 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:13 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 10:37:13 client newly acked packets (1): [6] 2025/04/30 10:37:13 client updated RTT: 33.733ms (σ: 9.89ms) 2025/04/30 10:37:13 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:13 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:13 client Queueing packet (759 bytes) for later decryption 2025/04/30 10:37:13 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:37:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:14 client -> Sending packet 7 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:14 client Long Header{Type: Initial, DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:14 client -> &wire.PingFrame{} 2025/04/30 10:37:15 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:16 client Parsed a coalesced packet. Part 1: 58 bytes. Remaining: 1142 bytes. 2025/04/30 10:37:16 client <- Reading packet 10 (58 bytes) for connection (empty), Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 28, Version: v1} 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 2.027664s} 2025/04/30 10:37:16 client newly acked packets (1): [7] 2025/04/30 10:37:16 client updated RTT: 287.179ms (σ: 514.31ms) 2025/04/30 10:37:16 client <- &wire.PingFrame{} 2025/04/30 10:37:16 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:37:16 client -> Sending packet 8 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:37:16 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:16 client <- Reading packet 11 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 104µs} 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Queueing packet (1054 bytes) for later decryption 2025/04/30 10:37:16 client -> Sending packet 9 (1280 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:37:16 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:16 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:16 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:16 client <- Reading packet 6 (759 bytes) for connection (empty), Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, PacketNumber: 6, PacketNumberLen: 1, Length: 730, Version: v1} 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:37:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, InitialSourceConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:16 client <- Reading packet 7 (50 bytes) for connection (empty), Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, PacketNumber: 7, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:37:16 client <- &wire.PingFrame{} 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (1142 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (1054 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client <- Reading packet 12 (759 bytes) for connection (empty), Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, PacketNumber: 12, PacketNumberLen: 1, Length: 730, Version: v1} 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:37:16 client -> Sending packet 0 (93 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 64, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 6}}, DelayTime: 0s} 2025/04/30 10:37:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:16 client Dropping Initial keys. 2025/04/30 10:37:16 client -> Sending packet 0 (58 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 1c2c48df7c64078cb9f47bfcd4e9ab0e353f0924, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:16 client <- Reading packet 13 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:16 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, StatelessResetToken: 0xeb298ab9ebcd64b944261cac92cd98a5} 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fa465042c77c608796b1658ac95ef8d1f7fb48cc, StatelessResetToken: 0x855d222a06a684f21735b43e5907c745} 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec20984f5ff6e3c23a2f54c89d68c8fad98208c2, StatelessResetToken: 0xd05dc690dc0aac9da144c2422666dad9} 2025/04/30 10:37:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:16 client Dropping Handshake keys. 2025/04/30 10:37:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:16 client -> Sending packet 1 (46 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 13, DelayTime: 145.532µs} 2025/04/30 10:37:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:16 client <- Reading packet 14 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:16 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112µs} 2025/04/30 10:37:16 client newly acked packets (1): [1] 2025/04/30 10:37:16 client updated RTT: 255.192ms (σ: 449.705ms) 2025/04/30 10:37:16 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:16 client setting loss timer for packet 0 (1-RTT) to 287.091ms (in 2025-04-30 10:37:16.710664114 +0000 UTC m=+30.402177675) 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 5a4662018dd441c68eb1a8612f384a7b80303295, StatelessResetToken: 0x9717641987208b93cd1caa3adcc5c01d} 2025/04/30 10:37:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:16 client Ignoring all packets below 14. 2025/04/30 10:37:16 client Sending ACK because the ACK timer expired. 2025/04/30 10:37:16 client -> Sending packet 2 (45 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 25.394671ms} 2025/04/30 10:37:16 client <- Reading packet 15 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:16 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 146.688ms} 2025/04/30 10:37:16 client <- &wire.PingFrame{} 2025/04/30 10:37:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:16 client Sending ACK because the ACK timer expired. 2025/04/30 10:37:16 client -> Sending packet 3 (45 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 14, DelayTime: 25.353062ms} 2025/04/30 10:37:16 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:37:16.710664114 +0000 UTC m=+30.402177675 2025/04/30 10:37:16 client lost packet 0 (time threshold) 2025/04/30 10:37:16 client Canceling loss detection timer. 2025/04/30 10:37:16 client -> Sending packet 4 (58 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:16 client <- Reading packet 17 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:16 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 144.656ms} 2025/04/30 10:37:16 client newly acked packets (1): [4] 2025/04/30 10:37:16 client updated RTT: 242.231ms (σ: 363.2ms) 2025/04/30 10:37:16 client Canceling loss detection timer. 2025/04/30 10:37:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:37:16 client -> Sending packet 5 (46 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 14, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 14}}, DelayTime: 155.56µs} 2025/04/30 10:37:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:16 client -> Sending packet 6 (42 bytes) for connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 8067b61e24e1d3fc78b946f4b1b20075e9c6025a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:16 client Connection 1716fbf5c93d7b125f9d29062eadc1a48a6b1cf5 closed. 2025/04/30 10:37:16 Requesting https://server4:443/owwsrjgurr. 2025/04/30 10:37:16 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:16 Increased send buffer size to 14336 kiB 2025/04/30 10:37:16 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:16 Created qlog file: /logs/qlog/b1a08ac733275230.sqlog 2025/04/30 10:37:16 client Starting new connection to server4 ([::]:48515 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b1a08ac733275230, version v1 2025/04/30 10:37:16 Adding connection ID (empty). 2025/04/30 10:37:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:16 client -> Sending packet 0 (1280 bytes) for connection b1a08ac733275230, Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: b1a08ac733275230, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:37:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:37:16 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:16 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:16 client Received first packet. Switching destination connection ID to: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 10:37:16 client newly acked packets (1): [0] 2025/04/30 10:37:16 client updated RTT: 33.2358ms (σ: 16.6179ms) 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 308 bytes. 2025/04/30 10:37:16 client <- Reading packet 1 (746 bytes) for connection (empty), Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, PacketNumber: 1, PacketNumberLen: 1, Length: 717, Version: v1} 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:37:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b1a08ac733275230, InitialSourceConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (308 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b1a08ac733275230 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:16 client Dropping Initial keys. 2025/04/30 10:37:16 client -> Sending packet 1 (52 bytes) for connection b1a08ac733275230, Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:16 client -> Sending packet 0 (58 bytes) for connection b1a08ac733275230, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:16 client Short Header{DestConnectionID: 0aae46ebdf82b6ae6df5681d224127f9ae3260ee, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:16 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128µs} 2025/04/30 10:37:16 client Peer doesn't await address validation any longer. 2025/04/30 10:37:16 client newly acked packets (1): [0] 2025/04/30 10:37:16 client updated RTT: 33.219ms (σ: 12.494ms) 2025/04/30 10:37:16 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:16 client Canceling loss detection timer. 2025/04/30 10:37:16 client Dropping Handshake keys. 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc899a9f19f68d398900d97fee084f08723ab30c, StatelessResetToken: 0x84f4c928a7561ef72c09ba33f522a904} 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b97eb2c8b0ddff6d7ab0e230f4ecef253baa427, StatelessResetToken: 0xa65a8b08126ea89ce634dc70b5f982a2} 2025/04/30 10:37:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3613eb7c0cc3dfede574f30e4743751ab312c058, StatelessResetToken: 0x1bf2fd019692978e8b4f3e97a6dc0f9c} 2025/04/30 10:37:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:16 client -> Sending packet 1 (46 bytes) for connection b1a08ac733275230, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: cc899a9f19f68d398900d97fee084f08723ab30c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 219.099µs} 2025/04/30 10:37:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:16 client -> Sending packet 2 (42 bytes) for connection b1a08ac733275230, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:16 client Short Header{DestConnectionID: cc899a9f19f68d398900d97fee084f08723ab30c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:16 client Connection b1a08ac733275230 closed. 2025/04/30 10:37:16 Requesting https://server4:443/iwfkakjnpb. 2025/04/30 10:37:16 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:16 Increased send buffer size to 14336 kiB 2025/04/30 10:37:16 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:16 Created qlog file: /logs/qlog/3c7aa6e49dd94b83156ed2a7d58cdc70.sqlog 2025/04/30 10:37:16 client Starting new connection to server4 ([::]:55803 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3c7aa6e49dd94b83156ed2a7d58cdc70, version v1 2025/04/30 10:37:16 Adding connection ID (empty). 2025/04/30 10:37:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:16 client -> Sending packet 0 (1280 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70, Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: 3c7aa6e49dd94b83156ed2a7d58cdc70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:37:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:37:16 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:16 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:16 client Received first packet. Switching destination connection ID to: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2 2025/04/30 10:37:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 10:37:16 client newly acked packets (1): [0] 2025/04/30 10:37:16 client updated RTT: 33.174614ms (σ: 16.587307ms) 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 298 bytes. 2025/04/30 10:37:16 client <- Reading packet 1 (756 bytes) for connection (empty), Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, PacketNumber: 1, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:37:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:37:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3c7aa6e49dd94b83156ed2a7d58cdc70, InitialSourceConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:16 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70 2025/04/30 10:37:16 client Long Header{Type: Initial, DestConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:16 client Dropping Initial keys. 2025/04/30 10:37:16 client -> Sending packet 1 (52 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70, Handshake 2025/04/30 10:37:16 client Long Header{Type: Handshake, DestConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:16 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:16 client -> Sending packet 0 (58 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:16 client Short Header{DestConnectionID: f5b1a149518c6421be06fb9d28bf5cdd29bbb5e2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:17 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3667160fe0ddb1fea7db18959cc6f756445857eb, StatelessResetToken: 0x01b9e8dddbc184d2afa44f33d8a1301b} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 50342f5f6941c5104862d7a5b26d157cc2d5732c, StatelessResetToken: 0xb16ac12fac64f552544fdb46b8a166d4} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0aa241d25b1a42508bc3852a82aee50f41568801, StatelessResetToken: 0xb5faff9b41b99bd5b76760274447ee66} 2025/04/30 10:37:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:17 client Dropping Handshake keys. 2025/04/30 10:37:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:17 client -> Sending packet 1 (46 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 3667160fe0ddb1fea7db18959cc6f756445857eb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 216.895µs} 2025/04/30 10:37:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:17 client <- Reading packet 3 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112µs} 2025/04/30 10:37:17 client newly acked packets (1): [1] 2025/04/30 10:37:17 client updated RTT: 32.878ms (σ: 13.032ms) 2025/04/30 10:37:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:17 client lost packet 0 (time threshold) 2025/04/30 10:37:17 client Canceling loss detection timer. 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: bfe0ae3a61427c9bc42af650af6b52e1ca3a32d0, StatelessResetToken: 0xc05aaa86c28370c519e0286f1a28029a} 2025/04/30 10:37:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:17 client Ignoring all packets below 3. 2025/04/30 10:37:17 client -> Sending packet 2 (63 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 3667160fe0ddb1fea7db18959cc6f756445857eb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 154.137µs} 2025/04/30 10:37:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:17 client <- Reading packet 4 (1052 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 208µs} 2025/04/30 10:37:17 client newly acked packets (1): [2] 2025/04/30 10:37:17 client updated RTT: 32.704ms (σ: 10.12ms) 2025/04/30 10:37:17 client Canceling loss detection timer. 2025/04/30 10:37:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:17 client Ignoring all packets below 4. 2025/04/30 10:37:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:17 client -> Sending packet 3 (42 bytes) for connection 3c7aa6e49dd94b83156ed2a7d58cdc70, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 3667160fe0ddb1fea7db18959cc6f756445857eb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:17 client Connection 3c7aa6e49dd94b83156ed2a7d58cdc70 closed. 2025/04/30 10:37:17 Requesting https://server4:443/llnclbypih. 2025/04/30 10:37:17 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:17 Increased send buffer size to 14336 kiB 2025/04/30 10:37:17 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:17 Created qlog file: /logs/qlog/b4dd167d3554edee153dfd5cf7aeceb34c2c.sqlog 2025/04/30 10:37:17 client Starting new connection to server4 ([::]:39200 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b4dd167d3554edee153dfd5cf7aeceb34c2c, version v1 2025/04/30 10:37:17 Adding connection ID (empty). 2025/04/30 10:37:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:17 client -> Sending packet 0 (1280 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: b4dd167d3554edee153dfd5cf7aeceb34c2c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:17 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7595a05b17030399d375b72de60b6e530f403469, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:17 client Received first packet. Switching destination connection ID to: 7595a05b17030399d375b72de60b6e530f403469 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 10:37:17 client newly acked packets (1): [0] 2025/04/30 10:37:17 client updated RTT: 33.009897ms (σ: 16.504948ms) 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 298 bytes. 2025/04/30 10:37:17 client <- Reading packet 1 (756 bytes) for connection (empty), Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7595a05b17030399d375b72de60b6e530f403469, PacketNumber: 1, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:37:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b4dd167d3554edee153dfd5cf7aeceb34c2c, InitialSourceConnectionID: 7595a05b17030399d375b72de60b6e530f403469, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:17 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client Dropping Initial keys. 2025/04/30 10:37:17 client -> Sending packet 1 (52 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:17 client -> Sending packet 0 (58 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:17 client -> Sending packet 2 (86 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client -> Sending packet 3 (86 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:37:17 client -> Sending packet 4 (86 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client -> Sending packet 5 (86 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 7595a05b17030399d375b72de60b6e530f403469, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client <- Reading packet 4 (1296 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 378.56ms} 2025/04/30 10:37:17 client Peer doesn't await address validation any longer. 2025/04/30 10:37:17 client newly acked packets (1): [0] 2025/04/30 10:37:17 client updated RTT: 77.213ms (σ: 100.786ms) 2025/04/30 10:37:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:17 client Canceling loss detection timer. 2025/04/30 10:37:17 client Dropping Handshake keys. 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9cf73bbe14d64ee6f068f95334c6ae04bf104466, StatelessResetToken: 0x83fbe102897e09d9eb871fbcdb5cec97} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7063cde154a1625e73ab7d0a2d76a9373545bab, StatelessResetToken: 0x0b9228913e750fb8ccd3095be33af0e8} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9362744269c3c15a264fdbcf57bff00ba705e3a7, StatelessResetToken: 0x4dce11ae188dd75ee5a5f85cafd4543c} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9cf73bbe14d64ee6f068f95334c6ae04bf104466, StatelessResetToken: 0x83fbe102897e09d9eb871fbcdb5cec97} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7063cde154a1625e73ab7d0a2d76a9373545bab, StatelessResetToken: 0x0b9228913e750fb8ccd3095be33af0e8} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9362744269c3c15a264fdbcf57bff00ba705e3a7, StatelessResetToken: 0x4dce11ae188dd75ee5a5f85cafd4543c} 2025/04/30 10:37:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:17 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 378.792ms} 2025/04/30 10:37:17 client <- &wire.PingFrame{} 2025/04/30 10:37:17 client -> Sending packet 1 (46 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 9cf73bbe14d64ee6f068f95334c6ae04bf104466, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 277.948µs} 2025/04/30 10:37:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:17 client -> Sending packet 2 (42 bytes) for connection b4dd167d3554edee153dfd5cf7aeceb34c2c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 9cf73bbe14d64ee6f068f95334c6ae04bf104466, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:17 client Connection b4dd167d3554edee153dfd5cf7aeceb34c2c closed. 2025/04/30 10:37:17 Requesting https://server4:443/ulyqesshqw. 2025/04/30 10:37:17 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:17 Increased send buffer size to 14336 kiB 2025/04/30 10:37:17 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:17 Created qlog file: /logs/qlog/5a487339007c78447d8f5706.sqlog 2025/04/30 10:37:17 client Starting new connection to server4 ([::]:47838 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5a487339007c78447d8f5706, version v1 2025/04/30 10:37:17 Adding connection ID (empty). 2025/04/30 10:37:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:17 client -> Sending packet 0 (1280 bytes) for connection 5a487339007c78447d8f5706, Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 5a487339007c78447d8f5706, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:17 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:17 client Received first packet. Switching destination connection ID to: 2a9d07932e6c6fc99aa4d56de049937f70e91d78 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 10:37:17 client newly acked packets (1): [0] 2025/04/30 10:37:17 client updated RTT: 33.093343ms (σ: 16.546671ms) 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 303 bytes. 2025/04/30 10:37:17 client <- Reading packet 1 (751 bytes) for connection (empty), Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:37:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5a487339007c78447d8f5706, InitialSourceConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:17 client Dropping %!s(logging.PacketType=5) packet (303 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a487339007c78447d8f5706 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client Dropping Initial keys. 2025/04/30 10:37:17 client -> Sending packet 1 (52 bytes) for connection 5a487339007c78447d8f5706, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:17 client -> Sending packet 0 (58 bytes) for connection 5a487339007c78447d8f5706, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 2a9d07932e6c6fc99aa4d56de049937f70e91d78, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:17 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112µs} 2025/04/30 10:37:17 client Peer doesn't await address validation any longer. 2025/04/30 10:37:17 client newly acked packets (1): [0] 2025/04/30 10:37:17 client updated RTT: 33.101ms (σ: 12.427ms) 2025/04/30 10:37:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:17 client Canceling loss detection timer. 2025/04/30 10:37:17 client Dropping Handshake keys. 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 066d77689779b192c7b1b75d219815d9182d8e29, StatelessResetToken: 0x932208932516979993f2d5f3533d4358} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d1b1efbd9dd40211237013e40b12ffceb91f5cd, StatelessResetToken: 0xe4e42800735e6cc919f175dc8228ef48} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a5e7c2dc544a1b601d93ab341fcd8677b0f19623, StatelessResetToken: 0x22172d66f2f098cb70ca32747ae302a2} 2025/04/30 10:37:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:17 client -> Sending packet 1 (46 bytes) for connection 5a487339007c78447d8f5706, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 066d77689779b192c7b1b75d219815d9182d8e29, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 236.431µs} 2025/04/30 10:37:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:17 client -> Sending packet 2 (42 bytes) for connection 5a487339007c78447d8f5706, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 066d77689779b192c7b1b75d219815d9182d8e29, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:17 client Connection 5a487339007c78447d8f5706 closed. 2025/04/30 10:37:17 Requesting https://server4:443/jpbrvfnecc. 2025/04/30 10:37:17 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:17 Increased send buffer size to 14336 kiB 2025/04/30 10:37:17 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:17 Created qlog file: /logs/qlog/5f07a01c1d363f479291f337.sqlog 2025/04/30 10:37:17 client Starting new connection to server4 ([::]:42499 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5f07a01c1d363f479291f337, version v1 2025/04/30 10:37:17 Adding connection ID (empty). 2025/04/30 10:37:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:17 client -> Sending packet 0 (1280 bytes) for connection 5f07a01c1d363f479291f337, Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 5f07a01c1d363f479291f337, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:17 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:17 client Received first packet. Switching destination connection ID to: e223922ee98985759ac467ed3a66e657e87fddc8 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 10:37:17 client newly acked packets (1): [0] 2025/04/30 10:37:17 client updated RTT: 32.991715ms (σ: 16.495857ms) 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 303 bytes. 2025/04/30 10:37:17 client <- Reading packet 1 (751 bytes) for connection (empty), Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:37:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5f07a01c1d363f479291f337, InitialSourceConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:17 client Dropping %!s(logging.PacketType=5) packet (303 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5f07a01c1d363f479291f337 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client Dropping Initial keys. 2025/04/30 10:37:17 client -> Sending packet 1 (52 bytes) for connection 5f07a01c1d363f479291f337, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:17 client -> Sending packet 0 (58 bytes) for connection 5f07a01c1d363f479291f337, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:17 client Short Header{DestConnectionID: e223922ee98985759ac467ed3a66e657e87fddc8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:17 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 10:37:17 client Peer doesn't await address validation any longer. 2025/04/30 10:37:17 client newly acked packets (1): [0] 2025/04/30 10:37:17 client updated RTT: 32.996ms (σ: 12.381ms) 2025/04/30 10:37:17 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:17 client Canceling loss detection timer. 2025/04/30 10:37:17 client Dropping Handshake keys. 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a8ba32b19d169faee17d426c49e4d8c6e8abbe0, StatelessResetToken: 0xaded38fea65efab1cf937da1e1f5ff86} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2a269edfd402e5bf329785fac44f49e65b038107, StatelessResetToken: 0xcf54e6a90a128bcd9d3c80fc02a2ea79} 2025/04/30 10:37:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4312186768c110c0e0556b0c0342e5aef8d969fd, StatelessResetToken: 0x7ad4080d97a17755a94e572e84d645be} 2025/04/30 10:37:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:17 client -> Sending packet 1 (46 bytes) for connection 5f07a01c1d363f479291f337, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 0a8ba32b19d169faee17d426c49e4d8c6e8abbe0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 262.811µs} 2025/04/30 10:37:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:17 client -> Sending packet 2 (42 bytes) for connection 5f07a01c1d363f479291f337, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:17 client Short Header{DestConnectionID: 0a8ba32b19d169faee17d426c49e4d8c6e8abbe0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:17 client Connection 5f07a01c1d363f479291f337 closed. 2025/04/30 10:37:17 Requesting https://server4:443/lucytecuti. 2025/04/30 10:37:17 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:17 Increased send buffer size to 14336 kiB 2025/04/30 10:37:17 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:17 Created qlog file: /logs/qlog/674e89198a11d65d975969.sqlog 2025/04/30 10:37:17 client Starting new connection to server4 ([::]:44037 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 674e89198a11d65d975969, version v1 2025/04/30 10:37:17 Adding connection ID (empty). 2025/04/30 10:37:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:17 client -> Sending packet 0 (1280 bytes) for connection 674e89198a11d65d975969, Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 674e89198a11d65d975969, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:37:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:17 client -> Sending packet 1 (1280 bytes) for connection 674e89198a11d65d975969, Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 674e89198a11d65d975969, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:37:17 client -> Sending packet 2 (1280 bytes) for connection 674e89198a11d65d975969, Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: 674e89198a11d65d975969, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:17 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:17 client Received first packet. Switching destination connection ID to: de2c4992666c2206294610f6618e7c6c6b588305 2025/04/30 10:37:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 288µs} 2025/04/30 10:37:17 client newly acked packets (1): [2] 2025/04/30 10:37:17 client updated RTT: 34.135736ms (σ: 17.067868ms) 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:37:17 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:37:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:37:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 674e89198a11d65d975969, InitialSourceConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:17 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 674e89198a11d65d975969 2025/04/30 10:37:17 client Long Header{Type: Initial, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:17 client Dropping Initial keys. 2025/04/30 10:37:17 client -> Sending packet 1 (110 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:17 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:17 client Short Header{DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:18 client -> Sending packet 2 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:18 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:18 client -> Sending packet 3 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:18 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:37:18 client -> Sending packet 4 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:18 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:18 client -> Sending packet 5 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:18 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:18 client <- Reading packet 4 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:18 client <- &wire.PingFrame{} 2025/04/30 10:37:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:18 client <- Reading packet 5 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:18 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:18 client <- &wire.PingFrame{} 2025/04/30 10:37:18 client -> Sending packet 1 (44 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:18 client Short Header{DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:18 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 108.832µs} 2025/04/30 10:37:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:37:18 client -> Sending packet 6 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:18 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:18 client -> Sending packet 7 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:18 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:18 client <- Reading packet 6 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:18 client <- &wire.PingFrame{} 2025/04/30 10:37:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:18 client <- Reading packet 7 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:18 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:18 client <- &wire.PingFrame{} 2025/04/30 10:37:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:37:18 client -> Sending packet 2 (44 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:18 client Short Header{DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:18 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 134.852µs} 2025/04/30 10:37:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 10:37:19 client -> Sending packet 8 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:19 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:19 client -> Sending packet 9 (86 bytes) for connection 674e89198a11d65d975969, Handshake 2025/04/30 10:37:19 client Long Header{Type: Handshake, DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:19 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:19 client <- Reading packet 8 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:19 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:19 client <- &wire.PingFrame{} 2025/04/30 10:37:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:19 client <- Reading packet 9 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:19 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:19 client <- &wire.PingFrame{} 2025/04/30 10:37:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:37:19 client -> Sending packet 3 (44 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:19 client Short Header{DestConnectionID: de2c4992666c2206294610f6618e7c6c6b588305, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:19 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, DelayTime: 132.367µs} 2025/04/30 10:37:19 client <- Reading packet 10 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:19 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 91987199af7d4d5b1aa1c498a52aaac934f0a092, StatelessResetToken: 0xf4841b49202386dd1e9e5b5225fc38de} 2025/04/30 10:37:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4523d11ba14ae194ba6fc2236f6aa8ca9a3e0460, StatelessResetToken: 0xf5cf2a402e12d20d2db78e55372a66e8} 2025/04/30 10:37:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f7f279130333a1810bb225a1b25885f673eb0e09, StatelessResetToken: 0x3ec509d9620846e0756601f0a3d9b028} 2025/04/30 10:37:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:19 client Dropping Handshake keys. 2025/04/30 10:37:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:19 client -> Sending packet 5 (65 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:19 client Short Header{DestConnectionID: 91987199af7d4d5b1aa1c498a52aaac934f0a092, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:19 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, DelayTime: 134.01µs} 2025/04/30 10:37:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:19 client -> Sending packet 6 (60 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:19 client Short Header{DestConnectionID: 91987199af7d4d5b1aa1c498a52aaac934f0a092, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client <- Reading packet 12 (1097 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 132.544ms} 2025/04/30 10:37:20 client newly acked packets (1): [6] 2025/04/30 10:37:20 client updated RTT: 47.309ms (σ: 39.148ms) 2025/04/30 10:37:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:20 client Canceling loss detection timer. 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 6f31b06a2ff3e37b0c89b099bab260bea362594c, StatelessResetToken: 0xcda376b11f14e472789de23e90c386df} 2025/04/30 10:37:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:20 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:37:20 client -> Sending packet 7 (46 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 91987199af7d4d5b1aa1c498a52aaac934f0a092, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 4}}, DelayTime: 215.141µs} 2025/04/30 10:37:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:20 client -> Sending packet 8 (42 bytes) for connection 674e89198a11d65d975969, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 91987199af7d4d5b1aa1c498a52aaac934f0a092, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:20 client Connection 674e89198a11d65d975969 closed. 2025/04/30 10:37:20 Requesting https://server4:443/phpxiylmsj. 2025/04/30 10:37:20 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:20 Increased send buffer size to 14336 kiB 2025/04/30 10:37:20 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:20 Created qlog file: /logs/qlog/74907c7a8d0e3c3fe6f1c2.sqlog 2025/04/30 10:37:20 client Starting new connection to server4 ([::]:39364 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 74907c7a8d0e3c3fe6f1c2, version v1 2025/04/30 10:37:20 Adding connection ID (empty). 2025/04/30 10:37:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:20 client -> Sending packet 0 (1280 bytes) for connection 74907c7a8d0e3c3fe6f1c2, Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: 74907c7a8d0e3c3fe6f1c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:37:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:20 client -> Sending packet 1 (1280 bytes) for connection 74907c7a8d0e3c3fe6f1c2, Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: 74907c7a8d0e3c3fe6f1c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:37:20 client -> Sending packet 2 (1280 bytes) for connection 74907c7a8d0e3c3fe6f1c2, Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: 74907c7a8d0e3c3fe6f1c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:20 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:20 client Received first packet. Switching destination connection ID to: a5abdcc01c30e290ab82ba7051490fc2cd5a0831 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 344µs} 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:37:20 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:37:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 74907c7a8d0e3c3fe6f1c2, InitialSourceConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:20 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 74907c7a8d0e3c3fe6f1c2 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:20 client Dropping Initial keys. 2025/04/30 10:37:20 client -> Sending packet 1 (52 bytes) for connection 74907c7a8d0e3c3fe6f1c2, Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:20 client -> Sending packet 0 (58 bytes) for connection 74907c7a8d0e3c3fe6f1c2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: a5abdcc01c30e290ab82ba7051490fc2cd5a0831, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:37:20 client Peer doesn't await address validation any longer. 2025/04/30 10:37:20 client newly acked packets (1): [0] 2025/04/30 10:37:20 client updated RTT: 32.968491ms (σ: 16.484245ms) 2025/04/30 10:37:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:20 client Canceling loss detection timer. 2025/04/30 10:37:20 client Dropping Handshake keys. 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8dbf0fff0fd0f04bd128b3dfa99a16024f1f4fb, StatelessResetToken: 0x76f05e92f7565121120185a9fd3eb35f} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b1b9d40dff6de429df3eee9c3a443ac38e94572f, StatelessResetToken: 0x136b4fc0ba05a685ad01e00ff23c47c1} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 402d3ec1acea86a7b39ef7dc3eae87cd63c01e14, StatelessResetToken: 0x737fe9eb83d0e331eb0037386d58e0af} 2025/04/30 10:37:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:20 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:20 client -> Sending packet 1 (46 bytes) for connection 74907c7a8d0e3c3fe6f1c2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: d8dbf0fff0fd0f04bd128b3dfa99a16024f1f4fb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 148.958µs} 2025/04/30 10:37:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:20 client -> Sending packet 2 (42 bytes) for connection 74907c7a8d0e3c3fe6f1c2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: d8dbf0fff0fd0f04bd128b3dfa99a16024f1f4fb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:20 client Connection 74907c7a8d0e3c3fe6f1c2 closed. 2025/04/30 10:37:20 Requesting https://server4:443/wpzpacfdsi. 2025/04/30 10:37:20 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:20 Increased send buffer size to 14336 kiB 2025/04/30 10:37:20 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:20 Created qlog file: /logs/qlog/1726f92d7a61994ada0ed8.sqlog 2025/04/30 10:37:20 client Starting new connection to server4 ([::]:53509 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1726f92d7a61994ada0ed8, version v1 2025/04/30 10:37:20 Adding connection ID (empty). 2025/04/30 10:37:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:20 client -> Sending packet 0 (1280 bytes) for connection 1726f92d7a61994ada0ed8, Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: 1726f92d7a61994ada0ed8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:20 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:20 client Received first packet. Switching destination connection ID to: b741fe3c643eee412be0a464dbe8d463accc4700 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 10:37:20 client newly acked packets (1): [0] 2025/04/30 10:37:20 client updated RTT: 32.974243ms (σ: 16.487121ms) 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 2: 750 bytes. Remaining: 304 bytes. 2025/04/30 10:37:20 client <- Reading packet 1 (750 bytes) for connection (empty), Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:37:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1726f92d7a61994ada0ed8, InitialSourceConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:20 client Dropping %!s(logging.PacketType=5) packet (304 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1726f92d7a61994ada0ed8 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:20 client Dropping Initial keys. 2025/04/30 10:37:20 client -> Sending packet 1 (52 bytes) for connection 1726f92d7a61994ada0ed8, Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:20 client -> Sending packet 0 (58 bytes) for connection 1726f92d7a61994ada0ed8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client -> Sending packet 1 (42 bytes) for connection 1726f92d7a61994ada0ed8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: b741fe3c643eee412be0a464dbe8d463accc4700, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 17, Data length: 0, Offset + Data length: 17} 2025/04/30 10:37:20 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:37:20 client Peer doesn't await address validation any longer. 2025/04/30 10:37:20 client newly acked packets (2): [0 1] 2025/04/30 10:37:20 client updated RTT: 32.978ms (σ: 12.374ms) 2025/04/30 10:37:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:20 client Canceling loss detection timer. 2025/04/30 10:37:20 client Dropping Handshake keys. 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de362e06f9a58d4a0d9410423bcb1ad78eba9b0f, StatelessResetToken: 0x3dad95e1313a6881bcc0b25b9073c556} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1bd0af1d0b59fbc6b8c7cb6155f7f23c63e20f2f, StatelessResetToken: 0xe084f32548e5e4f2f7b0b1893f5d5123} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d30056e025a4a4aad5c5db279851604dc4e5782a, StatelessResetToken: 0x96f792fc155de5a5a663ae8cde852c77} 2025/04/30 10:37:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:20 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:20 client -> Sending packet 2 (46 bytes) for connection 1726f92d7a61994ada0ed8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: de362e06f9a58d4a0d9410423bcb1ad78eba9b0f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 134.14µs} 2025/04/30 10:37:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:20 client -> Sending packet 3 (42 bytes) for connection 1726f92d7a61994ada0ed8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: de362e06f9a58d4a0d9410423bcb1ad78eba9b0f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:20 client Connection 1726f92d7a61994ada0ed8 closed. 2025/04/30 10:37:20 Requesting https://server4:443/kexhiupxzu. 2025/04/30 10:37:20 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:20 Increased send buffer size to 14336 kiB 2025/04/30 10:37:20 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:20 Created qlog file: /logs/qlog/bde4427f444d0468a51501f1c0b47cb5b4.sqlog 2025/04/30 10:37:20 client Starting new connection to server4 ([::]:46461 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bde4427f444d0468a51501f1c0b47cb5b4, version v1 2025/04/30 10:37:20 Adding connection ID (empty). 2025/04/30 10:37:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:20 client -> Sending packet 0 (1280 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: bde4427f444d0468a51501f1c0b47cb5b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:20 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:20 client Received first packet. Switching destination connection ID to: e974e806880ce6e6a80be26db3d9f1b5fca79493 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 10:37:20 client newly acked packets (1): [0] 2025/04/30 10:37:20 client updated RTT: 33.038329ms (σ: 16.519164ms) 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 2: 755 bytes. Remaining: 299 bytes. 2025/04/30 10:37:20 client <- Reading packet 1 (755 bytes) for connection (empty), Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, PacketNumber: 1, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:37:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bde4427f444d0468a51501f1c0b47cb5b4, InitialSourceConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:20 client Dropping %!s(logging.PacketType=5) packet (299 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1106, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:20 client Short Header{DestConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client Dropping Initial keys. 2025/04/30 10:37:20 client -> Sending packet 1 (52 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:37:20 client -> Sending packet 2 (86 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:20 client -> Sending packet 3 (86 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: e974e806880ce6e6a80be26db3d9f1b5fca79493, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:20 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d487abf8cbdfb75314de58d02a71033896be32d, StatelessResetToken: 0x8223258f91222e7d7ac7aeada2224aaf} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef0395cd347b9c8bd04ad8ddd3dd0a5a5d12bf7e, StatelessResetToken: 0xad39d4bdbc45212edbdb1c827929537a} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e0b87ae165ec80de8afbee7ecf50cf0e845b60bb, StatelessResetToken: 0x0617c5c39af68be4405b6395d6b15dba} 2025/04/30 10:37:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:20 client Dropping Handshake keys. 2025/04/30 10:37:20 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:20 client -> Sending packet 2 (65 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 2d487abf8cbdfb75314de58d02a71033896be32d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 108.321µs} 2025/04/30 10:37:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client -> Sending packet 3 (60 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 2d487abf8cbdfb75314de58d02a71033896be32d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 64µs} 2025/04/30 10:37:20 client newly acked packets (1): [3] 2025/04/30 10:37:20 client updated RTT: 32.89ms (σ: 12.684ms) 2025/04/30 10:37:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:20 client Canceling loss detection timer. 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: bf55ce1a1c42c22564001e020daa4801e04d96b4, StatelessResetToken: 0xe5f27f0b9be509692f10c27def4ae534} 2025/04/30 10:37:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:20 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:20 client -> Sending packet 4 (42 bytes) for connection bde4427f444d0468a51501f1c0b47cb5b4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 2d487abf8cbdfb75314de58d02a71033896be32d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:20 client Connection bde4427f444d0468a51501f1c0b47cb5b4 closed. 2025/04/30 10:37:20 Requesting https://server4:443/hckmjwqxyb. 2025/04/30 10:37:20 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:20 Increased send buffer size to 14336 kiB 2025/04/30 10:37:20 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:20 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:20 Created qlog file: /logs/qlog/45bea9e17ba89072.sqlog 2025/04/30 10:37:20 client Starting new connection to server4 ([::]:58748 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 45bea9e17ba89072, version v1 2025/04/30 10:37:20 Adding connection ID (empty). 2025/04/30 10:37:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:20 client -> Sending packet 0 (1280 bytes) for connection 45bea9e17ba89072, Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: 45bea9e17ba89072, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:20 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:20 client Received first packet. Switching destination connection ID to: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 10:37:20 client newly acked packets (1): [0] 2025/04/30 10:37:20 client updated RTT: 33.097883ms (σ: 16.548941ms) 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 308 bytes. 2025/04/30 10:37:20 client <- Reading packet 1 (746 bytes) for connection (empty), Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, PacketNumber: 1, PacketNumberLen: 1, Length: 717, Version: v1} 2025/04/30 10:37:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:37:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 45bea9e17ba89072, InitialSourceConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:20 client Dropping %!s(logging.PacketType=5) packet (308 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 45bea9e17ba89072 2025/04/30 10:37:20 client Long Header{Type: Initial, DestConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:20 client Dropping Initial keys. 2025/04/30 10:37:20 client -> Sending packet 1 (52 bytes) for connection 45bea9e17ba89072, Handshake 2025/04/30 10:37:20 client Long Header{Type: Handshake, DestConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:20 client -> Sending packet 0 (58 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 9f9ca9a9ce1feda57fe591ecafc8bf8253cbdba2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, StatelessResetToken: 0x43b15aa44140c7420ad0cb502b2a242c} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: caebd9859174b9179f634c6ee480e0d464ea3de1, StatelessResetToken: 0x7fe56caea196c8602f7b84c435e556b6} 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 958beccdf48701e828d74a6528ef31a5ebec5815, StatelessResetToken: 0x39770357d7e9472658e89bb43ea2de42} 2025/04/30 10:37:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:20 client Dropping Handshake keys. 2025/04/30 10:37:20 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:20 client -> Sending packet 1 (46 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 114.383µs} 2025/04/30 10:37:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:20 client -> Sending packet 3 (58 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client Skipping packet number 2 2025/04/30 10:37:20 client -> Sending packet 4 (41 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:20 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.PingFrame{} 2025/04/30 10:37:20 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:20 client Sending ACK because the ACK timer expired. 2025/04/30 10:37:20 client -> Sending packet 5 (45 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.253716ms} 2025/04/30 10:37:20 client <- Reading packet 4 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 104µs} 2025/04/30 10:37:20 client newly acked packets (1): [4] 2025/04/30 10:37:20 client updated RTT: 32.828ms (σ: 12.948ms) 2025/04/30 10:37:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:20 client setting loss timer for packet 3 (1-RTT) to 36.9315ms (in 2025-04-30 10:37:20.812266238 +0000 UTC m=+34.503779819) 2025/04/30 10:37:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: fd7a4f35a302ea8586dffa88aaf18b6cf6f8a1da, StatelessResetToken: 0xc9102254bc50fa268906282cd55747f9} 2025/04/30 10:37:20 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:37:20 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:37:20.812266238 +0000 UTC m=+34.503779819 2025/04/30 10:37:20 client lost packet 3 (time threshold) 2025/04/30 10:37:20 client Canceling loss detection timer. 2025/04/30 10:37:20 client -> Sending packet 6 (64 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 6.289667ms} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:37:20 client -> Sending packet 8 (58 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client -> Sending packet 9 (58 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:20 client -> Sending packet 10 (1315 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:20 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:20 client -> &wire.PingFrame{} 2025/04/30 10:37:20 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:20 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:20 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 80µs} 2025/04/30 10:37:20 client newly acked packets (1): [9] 2025/04/30 10:37:20 client updated RTT: 32.602ms (σ: 10.162ms) 2025/04/30 10:37:20 client Canceling loss detection timer. 2025/04/30 10:37:21 client <- Reading packet 9 (29 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:21 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 243.344ms} 2025/04/30 10:37:21 client <- &wire.PingFrame{} 2025/04/30 10:37:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:37:21 client -> Sending packet 11 (48 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 120.705µs} 2025/04/30 10:37:21 client <- Reading packet 11 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:21 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 9.488ms} 2025/04/30 10:37:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:37:21 client -> Sending packet 12 (50 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 124.302µs} 2025/04/30 10:37:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:21 client -> Sending packet 13 (42 bytes) for connection 45bea9e17ba89072, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: 0429ffe15df84dc4326ab92a3d7d40a0b48c227c, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:21 client Connection 45bea9e17ba89072 closed. 2025/04/30 10:37:21 Requesting https://server4:443/qvmzudimdm. 2025/04/30 10:37:21 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:21 Increased send buffer size to 14336 kiB 2025/04/30 10:37:21 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:21 Created qlog file: /logs/qlog/2a70bed5b4d807f176aad97f.sqlog 2025/04/30 10:37:21 client Starting new connection to server4 ([::]:49833 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2a70bed5b4d807f176aad97f, version v1 2025/04/30 10:37:21 Adding connection ID (empty). 2025/04/30 10:37:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:21 client -> Sending packet 0 (1280 bytes) for connection 2a70bed5b4d807f176aad97f, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: 2a70bed5b4d807f176aad97f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:37:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:21 client -> Sending packet 1 (1280 bytes) for connection 2a70bed5b4d807f176aad97f, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: 2a70bed5b4d807f176aad97f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:37:21 client -> Sending packet 2 (1280 bytes) for connection 2a70bed5b4d807f176aad97f, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: 2a70bed5b4d807f176aad97f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:37:21 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:21 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:21 client Received first packet. Switching destination connection ID to: f8766e9c515e5e64f43377705ab35bc764358a14 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 312µs} 2025/04/30 10:37:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Parsed a coalesced packet. Part 2: 750 bytes. Remaining: 304 bytes. 2025/04/30 10:37:21 client <- Reading packet 1 (750 bytes) for connection (empty), Handshake 2025/04/30 10:37:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:37:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:37:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2a70bed5b4d807f176aad97f, InitialSourceConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:21 client Dropping %!s(logging.PacketType=5) packet (304 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2a70bed5b4d807f176aad97f 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:21 client Long Header{Type: Handshake, DestConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:21 client Dropping Initial keys. 2025/04/30 10:37:21 client -> Sending packet 1 (52 bytes) for connection 2a70bed5b4d807f176aad97f, Handshake 2025/04/30 10:37:21 client Long Header{Type: Handshake, DestConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:21 client -> Sending packet 0 (58 bytes) for connection 2a70bed5b4d807f176aad97f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:21 client Short Header{DestConnectionID: f8766e9c515e5e64f43377705ab35bc764358a14, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:21 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:37:21 client Peer doesn't await address validation any longer. 2025/04/30 10:37:21 client newly acked packets (1): [0] 2025/04/30 10:37:21 client updated RTT: 32.946319ms (σ: 16.473159ms) 2025/04/30 10:37:21 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:21 client Canceling loss detection timer. 2025/04/30 10:37:21 client Dropping Handshake keys. 2025/04/30 10:37:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee4f2506783b75d38aac67306127d52b64083a0b, StatelessResetToken: 0x49943223da04b25896431edb83063632} 2025/04/30 10:37:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c20a3aafd6ca0e0006a9fc9e1535844aa848e38f, StatelessResetToken: 0xb7dc542f126e10383afe5cb5b5abb4e3} 2025/04/30 10:37:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: df0f79e91e1cd30cb785f00fb48e75e892b67eda, StatelessResetToken: 0x19bfe6d487ef153329864279e1337462} 2025/04/30 10:37:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:21 client -> Sending packet 1 (46 bytes) for connection 2a70bed5b4d807f176aad97f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: ee4f2506783b75d38aac67306127d52b64083a0b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 230.39µs} 2025/04/30 10:37:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:21 client -> Sending packet 2 (42 bytes) for connection 2a70bed5b4d807f176aad97f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: ee4f2506783b75d38aac67306127d52b64083a0b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:21 client Connection 2a70bed5b4d807f176aad97f closed. 2025/04/30 10:37:21 Requesting https://server4:443/iccbbouqbp. 2025/04/30 10:37:21 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:21 Increased send buffer size to 14336 kiB 2025/04/30 10:37:21 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:21 Created qlog file: /logs/qlog/b91a702d17e8389c521022dcac3468f4.sqlog 2025/04/30 10:37:21 client Starting new connection to server4 ([::]:36458 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b91a702d17e8389c521022dcac3468f4, version v1 2025/04/30 10:37:21 Adding connection ID (empty). 2025/04/30 10:37:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:21 client -> Sending packet 0 (1280 bytes) for connection b91a702d17e8389c521022dcac3468f4, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: b91a702d17e8389c521022dcac3468f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:37:21 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:37:21 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:37:21 client Received first packet. Switching destination connection ID to: d1b939b4982461c75012ac71ff70968288d3ca1b 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 10:37:21 client newly acked packets (1): [0] 2025/04/30 10:37:21 client updated RTT: 33.425754ms (σ: 16.712877ms) 2025/04/30 10:37:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:37:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Parsed a coalesced packet. Part 2: 755 bytes. Remaining: 299 bytes. 2025/04/30 10:37:21 client <- Reading packet 1 (755 bytes) for connection (empty), Handshake 2025/04/30 10:37:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, PacketNumber: 1, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:37:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:37:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:37:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b91a702d17e8389c521022dcac3468f4, InitialSourceConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:37:21 client Dropping %!s(logging.PacketType=5) packet (299 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:37:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b91a702d17e8389c521022dcac3468f4 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:37:21 client Long Header{Type: Handshake, DestConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:37:21 client Dropping Initial keys. 2025/04/30 10:37:21 client -> Sending packet 1 (52 bytes) for connection b91a702d17e8389c521022dcac3468f4, Handshake 2025/04/30 10:37:21 client Long Header{Type: Handshake, DestConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:37:21 client -> Sending packet 0 (58 bytes) for connection b91a702d17e8389c521022dcac3468f4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:37:21 client Short Header{DestConnectionID: d1b939b4982461c75012ac71ff70968288d3ca1b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:37:21 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:37:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144µs} 2025/04/30 10:37:21 client Peer doesn't await address validation any longer. 2025/04/30 10:37:21 client newly acked packets (1): [0] 2025/04/30 10:37:21 client updated RTT: 33.36ms (σ: 12.664ms) 2025/04/30 10:37:21 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:37:21 client Canceling loss detection timer. 2025/04/30 10:37:21 client Dropping Handshake keys. 2025/04/30 10:37:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4ebdb96ec0b6ba73f621f84efbf20f92afb53668, StatelessResetToken: 0x56cb0b269b814997af63a72c49ce3249} 2025/04/30 10:37:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 040bc31b07dea88a1e39c4082fea77988fae54b0, StatelessResetToken: 0x4ac0c13c0493cea06b5607d6391f4e19} 2025/04/30 10:37:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7dcbb4f3a0e5fbd434cb2feec845b27983482156, StatelessResetToken: 0x4ed3f6b4fe3bbd77dd55035103311f76} 2025/04/30 10:37:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:37:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:37:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:37:21 client -> Sending packet 1 (46 bytes) for connection b91a702d17e8389c521022dcac3468f4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: 4ebdb96ec0b6ba73f621f84efbf20f92afb53668, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 180.436µs} 2025/04/30 10:37:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:37:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:37:21 client -> Sending packet 2 (42 bytes) for connection b91a702d17e8389c521022dcac3468f4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:37:21 client Short Header{DestConnectionID: 4ebdb96ec0b6ba73f621f84efbf20f92afb53668, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:37:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:37:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:37:21 client Connection b91a702d17e8389c521022dcac3468f4 closed. 2025/04/30 10:37:21 Requesting https://server4:443/mfjnazkpag. 2025/04/30 10:37:21 Increased receive buffer size to 14336 kiB 2025/04/30 10:37:21 Increased send buffer size to 14336 kiB 2025/04/30 10:37:21 Setting DF for IPv4 and IPv6. 2025/04/30 10:37:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:37:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:37:21 Created qlog file: /logs/qlog/fd9a892382fd9315.sqlog 2025/04/30 10:37:21 client Starting new connection to server4 ([::]:47027 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fd9a892382fd9315, version v1 2025/04/30 10:37:21 Adding connection ID (empty). 2025/04/30 10:37:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:37:21 client -> Sending packet 0 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: fd9a892382fd9315, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:37:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:37:21 client -> Sending packet 1 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: fd9a892382fd9315, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:37:21 client -> Sending packet 2 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: fd9a892382fd9315, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:37:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:37:21 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:21 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:21 client Received first packet. Switching destination connection ID to: c9ada78468f800621723864a8ef58f4770437ad3 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 144µs} 2025/04/30 10:37:21 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:21 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:37:21 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:37:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:37:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:37:21 client newly acked packets (1): [2] 2025/04/30 10:37:21 client updated RTT: 34.057885ms (σ: 17.028942ms) 2025/04/30 10:37:21 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:37:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:22 client -> Sending packet 3 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:22 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:22 client -> &wire.PingFrame{} 2025/04/30 10:37:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:37:22 client -> Sending packet 4 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:22 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:22 client -> &wire.PingFrame{} 2025/04/30 10:37:22 client -> Sending packet 5 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:22 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:22 client -> &wire.PingFrame{} 2025/04/30 10:37:22 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:22 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:22 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 96µs} 2025/04/30 10:37:22 client newly acked packets (1): [5] 2025/04/30 10:37:22 client updated RTT: 34.055ms (σ: 12.775ms) 2025/04/30 10:37:22 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:23 client -> Sending packet 6 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:23 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:23 client -> &wire.PingFrame{} 2025/04/30 10:37:23 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:23 client <- Reading packet 6 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:23 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 144µs} 2025/04/30 10:37:23 client newly acked packets (1): [6] 2025/04/30 10:37:23 client updated RTT: 33.941ms (σ: 9.807ms) 2025/04/30 10:37:23 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:23 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:23 client Queueing packet (747 bytes) for later decryption 2025/04/30 10:37:23 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:37:24 client -> Sending packet 7 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:24 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:24 client -> &wire.PingFrame{} 2025/04/30 10:37:24 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:24 client <- Reading packet 9 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:24 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 152µs} 2025/04/30 10:37:24 client newly acked packets (1): [7] 2025/04/30 10:37:24 client updated RTT: 33.834ms (σ: 7.568ms) 2025/04/30 10:37:24 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:25 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:26 client -> Sending packet 8 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:26 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:26 client -> &wire.PingFrame{} 2025/04/30 10:37:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:37:27 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:29 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 7 2025/04/30 10:37:30 client -> Sending packet 9 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:30 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:30 client -> &wire.PingFrame{} 2025/04/30 10:37:30 client -> Sending packet 10 (1280 bytes) for connection fd9a892382fd9315, Initial 2025/04/30 10:37:30 client Long Header{Type: Initial, DestConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:37:30 client -> &wire.PingFrame{} 2025/04/30 10:37:30 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:37:30 client <- Reading packet 14 (54 bytes) for connection (empty), Initial 2025/04/30 10:37:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9ada78468f800621723864a8ef58f4770437ad3, Token: (empty), PacketNumber: 14, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:37:30 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 96µs} 2025/04/30 10:37:30 client newly acked packets (1): [10] 2025/04/30 10:37:30 client updated RTT: 33.874ms (σ: 5.757ms) 2025/04/30 10:37:30 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:37:31 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:37:31 client Destroying connection: timeout: handshake did not complete in time 2025/04/30 10:37:31 Removing connection ID (empty). 2025/04/30 10:37:31 client Connection fd9a892382fd9315 closed.