2025/04/30 10:34:46 Requesting https://server4:443/rdwchfopcv. 2025/04/30 10:34:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:46 Increased send buffer size to 14336 kiB 2025/04/30 10:34:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:46 Created qlog file: /logs/qlog/1fff035d3c10d7b0a0e4496013efe98a.sqlog 2025/04/30 10:34:46 client Starting new connection to server4 ([::]:42536 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1fff035d3c10d7b0a0e4496013efe98a, version v1 2025/04/30 10:34:46 Adding connection ID (empty). 2025/04/30 10:34:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:46 client -> Sending packet 0 (1280 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Initial 2025/04/30 10:34:46 client Long Header{Type: Initial, DestConnectionID: 1fff035d3c10d7b0a0e4496013efe98a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:34:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:34:47 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:34:47 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:34:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:34:47 client Received first packet. Switching destination connection ID to: 5cb266555b82c88996d4005dc4304a19334448d8 2025/04/30 10:34:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 10:34:47 client newly acked packets (1): [0] 2025/04/30 10:34:47 client updated RTT: 38.319127ms (σ: 19.159563ms) 2025/04/30 10:34:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:47 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 301 bytes. 2025/04/30 10:34:47 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, PacketNumber: 1, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:34:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:34:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1fff035d3c10d7b0a0e4496013efe98a, InitialSourceConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:47 client Dropping %!s(logging.PacketType=5) packet (301 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a 2025/04/30 10:34:47 client Long Header{Type: Initial, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:34:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:47 client Dropping Initial keys. 2025/04/30 10:34:47 client -> Sending packet 1 (52 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:47 client -> Sending packet 0 (58 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:47 client Short Header{DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:34:47 client -> Sending packet 2 (86 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:47 client -> Sending packet 3 (86 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:34:47 client -> Sending packet 4 (86 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:47 client -> Sending packet 5 (86 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:34:47 client -> Sending packet 6 (86 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:47 client -> Sending packet 7 (86 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, Handshake 2025/04/30 10:34:47 client Long Header{Type: Handshake, DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:48 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.PingFrame{} 2025/04/30 10:34:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:48 client -> Sending packet 1 (44 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: 5cb266555b82c88996d4005dc4304a19334448d8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 125.705µs} 2025/04/30 10:34:48 client <- Reading packet 4 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef41d81ccc2bddb334af15f5af2e53cfe47016cb, StatelessResetToken: 0xa2d413f4319a266df1842f61b37db576} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a53ed7bf78a18887beba4c9b00d18d821f99b651, StatelessResetToken: 0x5036aca6c83cd2c93e33e15bfc412c6f} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bd46a9488d7966acda25b03cb168175fda91a233, StatelessResetToken: 0x0f0d601aba2a6621d58416742a7c387e} 2025/04/30 10:34:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:48 client Dropping Handshake keys. 2025/04/30 10:34:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:34:48 client -> Sending packet 3 (65 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: ef41d81ccc2bddb334af15f5af2e53cfe47016cb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 114.463µs} 2025/04/30 10:34:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client -> Sending packet 4 (60 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: ef41d81ccc2bddb334af15f5af2e53cfe47016cb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client <- Reading packet 5 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 24µs} 2025/04/30 10:34:48 client newly acked packets (1): [4] 2025/04/30 10:34:48 client updated RTT: 37.509ms (σ: 15.987ms) 2025/04/30 10:34:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:34:48 client Canceling loss detection timer. 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 7c1ce52cf76e7bc501b9a3fe8e78f491ed7db32a, StatelessResetToken: 0xfa530c2000d7570921a9fa9b18688a2f} 2025/04/30 10:34:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:34:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:48 client -> Sending packet 5 (42 bytes) for connection 1fff035d3c10d7b0a0e4496013efe98a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:48 client Short Header{DestConnectionID: ef41d81ccc2bddb334af15f5af2e53cfe47016cb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:48 client Connection 1fff035d3c10d7b0a0e4496013efe98a closed. 2025/04/30 10:34:48 Requesting https://server4:443/ztmodvseac. 2025/04/30 10:34:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:48 Increased send buffer size to 14336 kiB 2025/04/30 10:34:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:48 Created qlog file: /logs/qlog/286db46d1399c090589ea2b5bd11df.sqlog 2025/04/30 10:34:48 client Starting new connection to server4 ([::]:34013 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 286db46d1399c090589ea2b5bd11df, version v1 2025/04/30 10:34:48 Adding connection ID (empty). 2025/04/30 10:34:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:48 client -> Sending packet 0 (1280 bytes) for connection 286db46d1399c090589ea2b5bd11df, Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: 286db46d1399c090589ea2b5bd11df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:34:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:34:48 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:34:48 client Received first packet. Switching destination connection ID to: de16d3410ff0b37df88f29efb721b352c0952b32 2025/04/30 10:34:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 10:34:48 client newly acked packets (1): [0] 2025/04/30 10:34:48 client updated RTT: 33.011191ms (σ: 16.505595ms) 2025/04/30 10:34:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 301 bytes. 2025/04/30 10:34:48 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, PacketNumber: 1, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:34:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:34:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 286db46d1399c090589ea2b5bd11df, InitialSourceConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:48 client Dropping %!s(logging.PacketType=5) packet (301 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 286db46d1399c090589ea2b5bd11df 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:48 client Dropping Initial keys. 2025/04/30 10:34:48 client -> Sending packet 1 (52 bytes) for connection 286db46d1399c090589ea2b5bd11df, Handshake 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:48 client -> Sending packet 0 (58 bytes) for connection 286db46d1399c090589ea2b5bd11df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: de16d3410ff0b37df88f29efb721b352c0952b32, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: afed16252e8c7f2110b124902121ef55a841c3f8, StatelessResetToken: 0x39b7c500560bff41f4b39da35b7a1312} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c8dd9643a4db383d7e8582b6a512d7efe8c8ff1f, StatelessResetToken: 0x9862518c83b3af71bdb624ea5fbacb24} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1dfa5ca8e9a3023216fd72d55c568061903c4fb8, StatelessResetToken: 0x6855ab48fec5ba5c56f0c1ede253aa78} 2025/04/30 10:34:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:48 client Dropping Handshake keys. 2025/04/30 10:34:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:48 client -> Sending packet 1 (46 bytes) for connection 286db46d1399c090589ea2b5bd11df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: afed16252e8c7f2110b124902121ef55a841c3f8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 122.95µs} 2025/04/30 10:34:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:34:48 client -> Sending packet 3 (58 bytes) for connection 286db46d1399c090589ea2b5bd11df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: afed16252e8c7f2110b124902121ef55a841c3f8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client Skipping packet number 2 2025/04/30 10:34:48 client -> Sending packet 4 (41 bytes) for connection 286db46d1399c090589ea2b5bd11df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: afed16252e8c7f2110b124902121ef55a841c3f8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:48 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.PingFrame{} 2025/04/30 10:34:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:48 client Sending ACK because the ACK timer expired. 2025/04/30 10:34:48 client -> Sending packet 5 (45 bytes) for connection 286db46d1399c090589ea2b5bd11df, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: afed16252e8c7f2110b124902121ef55a841c3f8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.241274ms} 2025/04/30 10:34:48 client <- Reading packet 4 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 32µs} 2025/04/30 10:34:48 client newly acked packets (2): [3 4] 2025/04/30 10:34:48 client updated RTT: 32.86ms (σ: 12.678ms) 2025/04/30 10:34:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:34:48 client Canceling loss detection timer. 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: d3e7d66227170ed79b197c7cb89c83ea3ed56091, StatelessResetToken: 0x372bbbffcff1bd656952488c7c3ae240} 2025/04/30 10:34:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:34:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:48 client -> Sending packet 6 (42 bytes) for connection 286db46d1399c090589ea2b5bd11df, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:48 client Short Header{DestConnectionID: afed16252e8c7f2110b124902121ef55a841c3f8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:48 client Connection 286db46d1399c090589ea2b5bd11df closed. 2025/04/30 10:34:48 Requesting https://server4:443/kjkllbqonj. 2025/04/30 10:34:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:48 Increased send buffer size to 14336 kiB 2025/04/30 10:34:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:48 Created qlog file: /logs/qlog/6139dde9d6a64b35cee5bde67b576b75b5d622.sqlog 2025/04/30 10:34:48 client Starting new connection to server4 ([::]:43425 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6139dde9d6a64b35cee5bde67b576b75b5d622, version v1 2025/04/30 10:34:48 Adding connection ID (empty). 2025/04/30 10:34:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:48 client -> Sending packet 0 (1280 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: 6139dde9d6a64b35cee5bde67b576b75b5d622, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:34:48 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:34:48 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:34:48 client Received first packet. Switching destination connection ID to: cfc7a86a52221c3a42901678611ef660cf73d696 2025/04/30 10:34:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 10:34:48 client newly acked packets (1): [0] 2025/04/30 10:34:48 client updated RTT: 32.971736ms (σ: 16.485868ms) 2025/04/30 10:34:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 297 bytes. 2025/04/30 10:34:48 client <- Reading packet 1 (757 bytes) for connection (empty), Handshake 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:34:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:34:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6139dde9d6a64b35cee5bde67b576b75b5d622, InitialSourceConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:48 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:48 client Dropping Initial keys. 2025/04/30 10:34:48 client -> Sending packet 1 (110 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, Handshake 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:48 client Short Header{DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:34:48 client -> Sending packet 2 (86 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, Handshake 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:48 client -> Sending packet 3 (86 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, Handshake 2025/04/30 10:34:48 client Long Header{Type: Handshake, DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:48 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.PingFrame{} 2025/04/30 10:34:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:48 client -> Sending packet 1 (44 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: cfc7a86a52221c3a42901678611ef660cf73d696, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 93.163µs} 2025/04/30 10:34:48 client <- Reading packet 4 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5e8eba8c09031da54d29d162244bccf326a9b788, StatelessResetToken: 0x7d34afcb41e568082c67d0c167dedabd} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 30884f9797380190a6c9fc0c85f8b57281710627, StatelessResetToken: 0xed947888cd95212be55a3afe5fca79f4} 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e160af9625036d6997ea0f9b6532097eb024e984, StatelessResetToken: 0x9291bd8e9d76b5e419834042b4d20dd6} 2025/04/30 10:34:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:48 client Dropping Handshake keys. 2025/04/30 10:34:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:34:48 client -> Sending packet 3 (65 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: 5e8eba8c09031da54d29d162244bccf326a9b788, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 128.88µs} 2025/04/30 10:34:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client -> Sending packet 4 (60 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:48 client Short Header{DestConnectionID: 5e8eba8c09031da54d29d162244bccf326a9b788, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:48 client <- Reading packet 5 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 168µs} 2025/04/30 10:34:48 client newly acked packets (1): [4] 2025/04/30 10:34:48 client updated RTT: 32.841ms (σ: 12.622ms) 2025/04/30 10:34:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:34:48 client Canceling loss detection timer. 2025/04/30 10:34:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 3be4b7cc7361fb1552dd90b740203252251c313b, StatelessResetToken: 0xbdf691101d427aeb75601d4ffeab1141} 2025/04/30 10:34:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:34:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:48 client -> Sending packet 5 (42 bytes) for connection 6139dde9d6a64b35cee5bde67b576b75b5d622, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:48 client Short Header{DestConnectionID: 5e8eba8c09031da54d29d162244bccf326a9b788, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:48 client Connection 6139dde9d6a64b35cee5bde67b576b75b5d622 closed. 2025/04/30 10:34:48 Requesting https://server4:443/sretqywuwj. 2025/04/30 10:34:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:48 Increased send buffer size to 14336 kiB 2025/04/30 10:34:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:48 Created qlog file: /logs/qlog/7d5f91c2178ca58041f28f9f.sqlog 2025/04/30 10:34:48 client Starting new connection to server4 ([::]:39259 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7d5f91c2178ca58041f28f9f, version v1 2025/04/30 10:34:48 Adding connection ID (empty). 2025/04/30 10:34:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:48 client -> Sending packet 0 (1280 bytes) for connection 7d5f91c2178ca58041f28f9f, Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: 7d5f91c2178ca58041f28f9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:34:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:34:48 client -> Sending packet 1 (1280 bytes) for connection 7d5f91c2178ca58041f28f9f, Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: 7d5f91c2178ca58041f28f9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:34:48 client -> Sending packet 2 (1280 bytes) for connection 7d5f91c2178ca58041f28f9f, Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: 7d5f91c2178ca58041f28f9f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:34:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:34:48 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:34:48 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:34:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:34:48 client Received first packet. Switching destination connection ID to: 0581f45277819dec5d3b2d43f12b9ce6c61c092b 2025/04/30 10:34:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/04/30 10:34:48 client newly acked packets (1): [2] 2025/04/30 10:34:48 client updated RTT: 34.455462ms (σ: 17.227731ms) 2025/04/30 10:34:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:49 client -> Sending packet 3 (1280 bytes) for connection 7d5f91c2178ca58041f28f9f, Initial 2025/04/30 10:34:49 client Long Header{Type: Initial, DestConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:49 client -> &wire.PingFrame{} 2025/04/30 10:34:49 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:34:49 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:34:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:34:49 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 96µs} 2025/04/30 10:34:49 client newly acked packets (1): [3] 2025/04/30 10:34:49 client updated RTT: 34.272ms (σ: 13.284ms) 2025/04/30 10:34:49 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:49 client -> Sending packet 4 (1280 bytes) for connection 7d5f91c2178ca58041f28f9f, Initial 2025/04/30 10:34:49 client Long Header{Type: Initial, DestConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:49 client -> &wire.PingFrame{} 2025/04/30 10:34:49 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:34:49 client <- Reading packet 4 (52 bytes) for connection (empty), Initial 2025/04/30 10:34:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:34:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 96µs} 2025/04/30 10:34:49 client newly acked packets (1): [4] 2025/04/30 10:34:49 client updated RTT: 34.112ms (σ: 10.281ms) 2025/04/30 10:34:49 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:49 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:34:49 client <- Reading packet 5 (149 bytes) for connection (empty), Initial 2025/04/30 10:34:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:34:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 374.784ms} 2025/04/30 10:34:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:49 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:34:49 client -> Sending packet 5 (1280 bytes) for connection 7d5f91c2178ca58041f28f9f, Initial 2025/04/30 10:34:49 client Long Header{Type: Initial, DestConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:49 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:34:49 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:49 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:49 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:50 client <- Reading packet 8 (750 bytes) for connection (empty), Handshake 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, PacketNumber: 8, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:34:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:34:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7d5f91c2178ca58041f28f9f, InitialSourceConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:50 client -> Sending packet 0 (91 bytes) for connection 7d5f91c2178ca58041f28f9f, Handshake 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:34:50 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:50 client Dropping Initial keys. 2025/04/30 10:34:50 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:50 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:50 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:50 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:50 client -> Sending packet 0 (58 bytes) for connection 7d5f91c2178ca58041f28f9f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 0581f45277819dec5d3b2d43f12b9ce6c61c092b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:50 client <- Reading packet 10 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:50 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41765603e9cc532d0efc0aed955681627cb3706e, StatelessResetToken: 0xf7827bc76f0796b13c38f3d063dd3a96} 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0fedd3cc53cf4e59358dca7ef7c7135667be4612, StatelessResetToken: 0x8ba0b976e6806fdf2899f582e9599094} 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 199f9b899b474ed2c3051c63539b3c4576f8d2f0, StatelessResetToken: 0x78fa21161b840f61a2c0e20d3fb9e211} 2025/04/30 10:34:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:50 client Dropping Handshake keys. 2025/04/30 10:34:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:50 client -> Sending packet 1 (46 bytes) for connection 7d5f91c2178ca58041f28f9f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 41765603e9cc532d0efc0aed955681627cb3706e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 145.802µs} 2025/04/30 10:34:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:50 client <- Reading packet 11 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:50 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80µs} 2025/04/30 10:34:50 client newly acked packets (1): [1] 2025/04/30 10:34:50 client updated RTT: 33.702ms (σ: 8.529ms) 2025/04/30 10:34:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:34:50 client lost packet 0 (time threshold) 2025/04/30 10:34:50 client Canceling loss detection timer. 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: d7ce4d31640ec665a73b2eb5b88fd0e4772b45fb, StatelessResetToken: 0xd405229571e44f877ae047e2a41b2ab2} 2025/04/30 10:34:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:50 client Ignoring all packets below 11. 2025/04/30 10:34:50 client -> Sending packet 2 (63 bytes) for connection 7d5f91c2178ca58041f28f9f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 41765603e9cc532d0efc0aed955681627cb3706e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 167.152µs} 2025/04/30 10:34:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:34:50 client -> Sending packet 4 (58 bytes) for connection 7d5f91c2178ca58041f28f9f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 41765603e9cc532d0efc0aed955681627cb3706e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:50 client -> Sending packet 5 (58 bytes) for connection 7d5f91c2178ca58041f28f9f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 41765603e9cc532d0efc0aed955681627cb3706e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:50 client <- Reading packet 12 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:50 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:50 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 64µs} 2025/04/30 10:34:50 client newly acked packets (1): [5] 2025/04/30 10:34:50 client updated RTT: 33.452ms (σ: 6.895ms) 2025/04/30 10:34:50 client Canceling loss detection timer. 2025/04/30 10:34:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:34:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:34:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:50 client -> Sending packet 6 (42 bytes) for connection 7d5f91c2178ca58041f28f9f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 41765603e9cc532d0efc0aed955681627cb3706e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:50 client Connection 7d5f91c2178ca58041f28f9f closed. 2025/04/30 10:34:50 Requesting https://server4:443/kkeahclowy. 2025/04/30 10:34:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:50 Increased send buffer size to 14336 kiB 2025/04/30 10:34:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:50 Created qlog file: /logs/qlog/7942ffef0e91d91113497aee78815466396e6f.sqlog 2025/04/30 10:34:50 client Starting new connection to server4 ([::]:59502 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7942ffef0e91d91113497aee78815466396e6f, version v1 2025/04/30 10:34:50 Adding connection ID (empty). 2025/04/30 10:34:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:50 client -> Sending packet 0 (1280 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: 7942ffef0e91d91113497aee78815466396e6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:34:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:34:50 client -> Sending packet 1 (1280 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: 7942ffef0e91d91113497aee78815466396e6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:34:50 client -> Sending packet 2 (1280 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: 7942ffef0e91d91113497aee78815466396e6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:34:50 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:34:50 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:34:50 client Received first packet. Switching destination connection ID to: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b 2025/04/30 10:34:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 288µs} 2025/04/30 10:34:50 client newly acked packets (1): [2] 2025/04/30 10:34:50 client updated RTT: 34.267672ms (σ: 17.133836ms) 2025/04/30 10:34:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:50 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 297 bytes. 2025/04/30 10:34:50 client <- Reading packet 1 (757 bytes) for connection (empty), Handshake 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:34:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:34:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7942ffef0e91d91113497aee78815466396e6f, InitialSourceConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:50 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:34:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:50 client Dropping Initial keys. 2025/04/30 10:34:50 client -> Sending packet 1 (52 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, Handshake 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:34:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:34:50 client -> Sending packet 0 (58 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:34:50 client -> Sending packet 2 (86 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, Handshake 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:50 client -> Sending packet 3 (86 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, Handshake 2025/04/30 10:34:50 client Long Header{Type: Handshake, DestConnectionID: 96e5925b1c3c343f95c9cb2a6b92eea0739d2f1b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:50 client <- Reading packet 3 (1174 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:50 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.2ms} 2025/04/30 10:34:50 client Peer doesn't await address validation any longer. 2025/04/30 10:34:50 client newly acked packets (1): [0] 2025/04/30 10:34:50 client updated RTT: 46.856ms (σ: 38.028ms) 2025/04/30 10:34:50 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:34:50 client Canceling loss detection timer. 2025/04/30 10:34:50 client Dropping Handshake keys. 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a3c8c01b279542c70d97caa622a878ce63cb85e, StatelessResetToken: 0x7c9318e64986f98ca9d82ce99c043bb7} 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5c7d5a83a4adb42e04daef6bba0eaf5f927185d, StatelessResetToken: 0xc4824d152832c71cf6791da4eeec0558} 2025/04/30 10:34:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b7de0c84bfde13269cec9defd8603dd8f979b213, StatelessResetToken: 0x9a028ff83c7394b2642297d0361bb272} 2025/04/30 10:34:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:34:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:50 client -> Sending packet 1 (46 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 9a3c8c01b279542c70d97caa622a878ce63cb85e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 210.723µs} 2025/04/30 10:34:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:50 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:50 client -> Sending packet 2 (42 bytes) for connection 7942ffef0e91d91113497aee78815466396e6f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:34:50 client Short Header{DestConnectionID: 9a3c8c01b279542c70d97caa622a878ce63cb85e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:50 client Connection 7942ffef0e91d91113497aee78815466396e6f closed. 2025/04/30 10:34:50 Requesting https://server4:443/sptqctmjwx. 2025/04/30 10:34:50 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:50 Increased send buffer size to 14336 kiB 2025/04/30 10:34:50 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:50 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:50 Created qlog file: /logs/qlog/df08883ea485dee65f182aa6cb.sqlog 2025/04/30 10:34:50 client Starting new connection to server4 ([::]:56803 -> 193.167.100.100:443), source connection ID (empty), destination connection ID df08883ea485dee65f182aa6cb, version v1 2025/04/30 10:34:50 Adding connection ID (empty). 2025/04/30 10:34:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:50 client -> Sending packet 0 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: df08883ea485dee65f182aa6cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:34:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:34:50 client -> Sending packet 1 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: df08883ea485dee65f182aa6cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:34:50 client -> Sending packet 2 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:50 client Long Header{Type: Initial, DestConnectionID: df08883ea485dee65f182aa6cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:34:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:34:51 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:34:51 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:34:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:34:51 client Received first packet. Switching destination connection ID to: bacdf213eba0f534f5d2f47c7de88df18f7a22a1 2025/04/30 10:34:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/04/30 10:34:51 client newly acked packets (1): [2] 2025/04/30 10:34:51 client updated RTT: 34.621513ms (σ: 17.310756ms) 2025/04/30 10:34:51 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:51 client -> Sending packet 3 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:51 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:51 client -> &wire.PingFrame{} 2025/04/30 10:34:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:34:51 client -> Sending packet 4 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:51 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:51 client -> &wire.PingFrame{} 2025/04/30 10:34:51 client -> Sending packet 5 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:51 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:51 client -> &wire.PingFrame{} 2025/04/30 10:34:51 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:34:51 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:34:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:34:51 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 136µs} 2025/04/30 10:34:51 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:34:51 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:34:51 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:34:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:34:51 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 72µs} 2025/04/30 10:34:51 client newly acked packets (1): [5] 2025/04/30 10:34:51 client updated RTT: 34.568ms (σ: 13.087ms) 2025/04/30 10:34:51 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:34:52 client -> Sending packet 6 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:52 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:52 client -> &wire.PingFrame{} 2025/04/30 10:34:52 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:34:53 client Queueing packet (751 bytes) for later decryption 2025/04/30 10:34:53 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:34:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:34:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:34:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:34:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/04/30 10:34:53 client -> Sending packet 7 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:53 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:53 client -> &wire.PingFrame{} 2025/04/30 10:34:53 client -> Sending packet 8 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:53 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:53 client -> &wire.PingFrame{} 2025/04/30 10:34:53 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:34:53 client <- Reading packet 8 (56 bytes) for connection (empty), Initial 2025/04/30 10:34:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:34:53 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 120µs} 2025/04/30 10:34:53 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:34:54 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:34:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:34:55 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:34:56 client Parsed a coalesced packet. Part 1: 153 bytes. Remaining: 1047 bytes. 2025/04/30 10:34:56 client <- Reading packet 9 (153 bytes) for connection (empty), Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 10:34:56 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 2.217736s} 2025/04/30 10:34:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:34:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:56 client Queueing packet (1047 bytes) for later decryption 2025/04/30 10:34:56 client -> Sending packet 9 (1280 bytes) for connection df08883ea485dee65f182aa6cb, Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:56 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:34:56 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:56 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:34:56 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:34:56 client <- Reading packet 6 (751 bytes) for connection (empty), Handshake 2025/04/30 10:34:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, PacketNumber: 6, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:34:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:34:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:34:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: df08883ea485dee65f182aa6cb, InitialSourceConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:34:56 client <- Reading packet 7 (50 bytes) for connection (empty), Handshake 2025/04/30 10:34:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, PacketNumber: 7, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:34:56 client <- &wire.PingFrame{} 2025/04/30 10:34:56 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:56 client Dropping %!s(logging.PacketType=5) packet (1047 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:56 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:56 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:56 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:34:56 client -> Sending packet 0 (149 bytes) for connection df08883ea485dee65f182aa6cb, Handshake 2025/04/30 10:34:56 client Long Header{Type: Handshake, DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:34:56 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 0s} 2025/04/30 10:34:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:34:56 client Short Header{DestConnectionID: bacdf213eba0f534f5d2f47c7de88df18f7a22a1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:34:56 client Dropping Initial keys. 2025/04/30 10:34:56 client <- Reading packet 11 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:34:56 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:34:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:34:56 client Peer doesn't await address validation any longer. 2025/04/30 10:34:56 client newly acked packets (1): [0] 2025/04/30 10:34:56 client updated RTT: 34.328ms (σ: 10.294ms) 2025/04/30 10:34:56 client Canceling loss detection timer. 2025/04/30 10:34:56 client Dropping Handshake keys. 2025/04/30 10:34:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cfac2e8e82f241b5162d533824b6e80d675ebcff, StatelessResetToken: 0x944bb300015aad6091b647d804318e30} 2025/04/30 10:34:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 862b63a2370551c65c60dad4af3e71f92d22bea9, StatelessResetToken: 0xc812ea7e53cbcac93b1f02fe1b370002} 2025/04/30 10:34:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 722c9d72dd7865934c82de9b0e810ce557c46187, StatelessResetToken: 0xa655070278c810a3da0d12e0c08fe56e} 2025/04/30 10:34:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:34:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:34:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:34:56 client -> Sending packet 1 (46 bytes) for connection df08883ea485dee65f182aa6cb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:56 client Short Header{DestConnectionID: cfac2e8e82f241b5162d533824b6e80d675ebcff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:56 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 211.615µs} 2025/04/30 10:34:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:34:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:34:56 client -> Sending packet 2 (42 bytes) for connection df08883ea485dee65f182aa6cb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:34:56 client Short Header{DestConnectionID: cfac2e8e82f241b5162d533824b6e80d675ebcff, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:34:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:34:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:34:56 client Connection df08883ea485dee65f182aa6cb closed. 2025/04/30 10:34:56 Requesting https://server4:443/qdluiaytgp. 2025/04/30 10:34:56 Increased receive buffer size to 14336 kiB 2025/04/30 10:34:56 Increased send buffer size to 14336 kiB 2025/04/30 10:34:56 Setting DF for IPv4 and IPv6. 2025/04/30 10:34:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:34:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:34:56 Created qlog file: /logs/qlog/298506c934a60ab8e42914650990b942caef.sqlog 2025/04/30 10:34:56 client Starting new connection to server4 ([::]:33298 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 298506c934a60ab8e42914650990b942caef, version v1 2025/04/30 10:34:56 Adding connection ID (empty). 2025/04/30 10:34:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:34:56 client -> Sending packet 0 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: 298506c934a60ab8e42914650990b942caef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:34:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:34:56 client -> Sending packet 1 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: 298506c934a60ab8e42914650990b942caef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:34:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:56 client -> Sending packet 2 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: 298506c934a60ab8e42914650990b942caef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:34:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:56 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:34:56 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:34:56 client Received first packet. Switching destination connection ID to: 33cce7da454ca45da587904f671274d7e42a70c7 2025/04/30 10:34:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:34:56 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:34:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:34:56 client -> Sending packet 3 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:56 client -> Sending packet 4 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:56 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:34:56 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:34:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:34:56 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 96µs} 2025/04/30 10:34:56 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:34:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:34:57 client -> Sending packet 5 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:57 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:57 client -> Sending packet 6 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:57 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:57 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:34:57 client <- Reading packet 5 (56 bytes) for connection (empty), Initial 2025/04/30 10:34:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:34:57 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 10:34:57 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:34:58 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:34:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:34:59 client -> Sending packet 7 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:59 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:59 client -> Sending packet 8 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:34:59 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:34:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:34:59 client Parsed a coalesced packet. Part 1: 58 bytes. Remaining: 1142 bytes. 2025/04/30 10:34:59 client <- Reading packet 8 (58 bytes) for connection (empty), Initial 2025/04/30 10:34:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 28, Version: v1} 2025/04/30 10:34:59 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 64µs} 2025/04/30 10:34:59 client newly acked packets (1): [8] 2025/04/30 10:34:59 client updated RTT: 33.884649ms (σ: 16.942324ms) 2025/04/30 10:34:59 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:35:00 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:00 client -> Sending packet 9 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:35:00 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:00 client -> &wire.PingFrame{} 2025/04/30 10:35:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:01 client Parsed a coalesced packet. Part 1: 155 bytes. Remaining: 1045 bytes. 2025/04/30 10:35:01 client <- Reading packet 9 (155 bytes) for connection (empty), Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 125, Version: v1} 2025/04/30 10:35:01 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1.995312s} 2025/04/30 10:35:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:01 client Queueing packet (1045 bytes) for later decryption 2025/04/30 10:35:01 client -> Sending packet 10 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:01 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:01 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:01 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:01 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:35:01 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:35:01 client Parsed a coalesced packet. Part 1: 62 bytes. Remaining: 1138 bytes. 2025/04/30 10:35:01 client <- Reading packet 10 (62 bytes) for connection (empty), Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 32, Version: v1} 2025/04/30 10:35:01 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1.995504s} 2025/04/30 10:35:01 client <- &wire.PingFrame{} 2025/04/30 10:35:01 client Queueing packet (1138 bytes) for later decryption 2025/04/30 10:35:01 client -> Sending packet 11 (1280 bytes) for connection 298506c934a60ab8e42914650990b942caef, Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:01 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:01 client <- Reading packet 12 (757 bytes) for connection (empty), Handshake 2025/04/30 10:35:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, PacketNumber: 12, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:35:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:35:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 298506c934a60ab8e42914650990b942caef, InitialSourceConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:01 client -> Sending packet 0 (91 bytes) for connection 298506c934a60ab8e42914650990b942caef, Handshake 2025/04/30 10:35:01 client Long Header{Type: Handshake, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:01 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 0s} 2025/04/30 10:35:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:01 client Dropping Initial keys. 2025/04/30 10:35:01 client Dropping %!s(logging.PacketType=5) packet (1045 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:01 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:01 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:01 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:01 client Dropping %!s(logging.PacketType=5) packet (1142 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:01 client Dropping %!s(logging.PacketType=5) packet (1138 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:01 client -> Sending packet 0 (58 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:01 client Short Header{DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:01 client <- Reading packet 13 (757 bytes) for connection (empty), Handshake 2025/04/30 10:35:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, PacketNumber: 13, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:35:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:35:01 client -> Sending packet 1 (52 bytes) for connection 298506c934a60ab8e42914650990b942caef, Handshake 2025/04/30 10:35:01 client Long Header{Type: Handshake, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:01 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 12, DelayTime: 0s} 2025/04/30 10:35:01 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:01 client -> Sending packet 2 (86 bytes) for connection 298506c934a60ab8e42914650990b942caef, Handshake 2025/04/30 10:35:01 client Long Header{Type: Handshake, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:01 client -> Sending packet 3 (86 bytes) for connection 298506c934a60ab8e42914650990b942caef, Handshake 2025/04/30 10:35:01 client Long Header{Type: Handshake, DestConnectionID: 33cce7da454ca45da587904f671274d7e42a70c7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:01 client <- Reading packet 14 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:01 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, StatelessResetToken: 0xdb06dcdef6241f956eee2575813beac8} 2025/04/30 10:35:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 76cfdcb7a98a0136f0ef25b19aac2cd13508e6b7, StatelessResetToken: 0xd7266db56c980e43cf845d3cc84eaf4a} 2025/04/30 10:35:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0d12721da179bc2318bb4fc46a1e48dc3d7df64f, StatelessResetToken: 0x3c5ed2bfd128e809171b93fb61ea2fda} 2025/04/30 10:35:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:01 client Dropping Handshake keys. 2025/04/30 10:35:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:01 client -> Sending packet 2 (65 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 146.724µs} 2025/04/30 10:35:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:01 client -> Sending packet 3 (60 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:01 client -> Sending packet 5 (60 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:01 client -> Sending packet 6 (60 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:01 client -> Sending packet 7 (1315 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.PingFrame{} 2025/04/30 10:35:01 client <- Reading packet 16 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:01 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:01 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 56µs} 2025/04/30 10:35:01 client newly acked packets (1): [6] 2025/04/30 10:35:01 client updated RTT: 33.662ms (σ: 13.15ms) 2025/04/30 10:35:01 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:01 client Canceling loss detection timer. 2025/04/30 10:35:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: e0ed27155eab1b39d17258455bb0331b9cf7a44f, StatelessResetToken: 0x1a95ae0a101aa87f71e08c9576e5a2a4} 2025/04/30 10:35:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:01 client <- Reading packet 17 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:01 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 48µs} 2025/04/30 10:35:01 client newly acked packets (1): [7] 2025/04/30 10:35:01 client updated RTT: 33.47ms (σ: 10.245ms) 2025/04/30 10:35:01 client -> Sending packet 8 (46 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 14, AckRanges: {{Largest: 17, Smallest: 16}, {Largest: 14, Smallest: 14}}, DelayTime: 170.287µs} 2025/04/30 10:35:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:01 client -> Sending packet 9 (42 bytes) for connection 298506c934a60ab8e42914650990b942caef, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:01 client Short Header{DestConnectionID: e4880e84ea6d15103fe8226035b65d143ae75cfc, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:01 client Connection 298506c934a60ab8e42914650990b942caef closed. 2025/04/30 10:35:01 Requesting https://server4:443/bqstpywcqk. 2025/04/30 10:35:01 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:01 Increased send buffer size to 14336 kiB 2025/04/30 10:35:01 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:01 Created qlog file: /logs/qlog/727e7cc46506541bb0ac5e6cf47396ae4b6ed9.sqlog 2025/04/30 10:35:01 client Starting new connection to server4 ([::]:43817 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, version v1 2025/04/30 10:35:01 Adding connection ID (empty). 2025/04/30 10:35:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:01 client -> Sending packet 0 (1280 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:01 client -> Sending packet 1 (1280 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:01 client -> Sending packet 2 (1280 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:01 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:01 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:01 client Received first packet. Switching destination connection ID to: 543b6295f34469d32330d4747b409bd01b49de70 2025/04/30 10:35:01 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 10:35:01 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:02 client -> Sending packet 3 (1280 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Initial 2025/04/30 10:35:02 client Long Header{Type: Initial, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:02 client -> Sending packet 4 (1280 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Initial 2025/04/30 10:35:02 client Long Header{Type: Initial, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:02 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:02 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 10:35:02 client newly acked packets (1): [4] 2025/04/30 10:35:02 client updated RTT: 33.920109ms (σ: 16.960054ms) 2025/04/30 10:35:02 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:02 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:02 client <- Reading packet 5 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 398.736ms} 2025/04/30 10:35:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:02 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:02 client -> Sending packet 5 (1280 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Initial 2025/04/30 10:35:02 client Long Header{Type: Initial, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:02 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:02 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:02 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:02 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:02 client <- Reading packet 6 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:02 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 96µs} 2025/04/30 10:35:02 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:02 client <- Reading packet 7 (757 bytes) for connection (empty), Handshake 2025/04/30 10:35:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, PacketNumber: 7, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:35:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:35:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, InitialSourceConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:02 client -> Sending packet 0 (91 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:02 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:02 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:02 client Dropping Initial keys. 2025/04/30 10:35:02 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:02 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:02 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:02 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:02 client -> Sending packet 0 (58 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:02 client Short Header{DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:02 client -> Sending packet 1 (86 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:02 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:02 client -> Sending packet 2 (86 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:02 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:02 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:02 client -> Sending packet 3 (86 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:02 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:02 client -> Sending packet 4 (86 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:02 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:03 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:03 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:03 client <- &wire.PingFrame{} 2025/04/30 10:35:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:03 client -> Sending packet 1 (44 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:03 client Short Header{DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:03 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 97.712µs} 2025/04/30 10:35:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:35:03 client -> Sending packet 5 (86 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:03 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:03 client -> Sending packet 6 (86 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, Handshake 2025/04/30 10:35:03 client Long Header{Type: Handshake, DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:03 client <- Reading packet 14 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:03 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 335.12ms} 2025/04/30 10:35:03 client Peer doesn't await address validation any longer. 2025/04/30 10:35:03 client <- &wire.PingFrame{} 2025/04/30 10:35:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:03 client -> Sending packet 2 (46 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:03 client Short Header{DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:03 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 10, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 10, Smallest: 10}}, DelayTime: 96.64µs} 2025/04/30 10:35:03 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:03 client <- Reading packet 15 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:03 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 780.864ms} 2025/04/30 10:35:03 client <- &wire.PingFrame{} 2025/04/30 10:35:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:03 client <- Reading packet 16 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:03 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 781.064ms} 2025/04/30 10:35:03 client <- &wire.PingFrame{} 2025/04/30 10:35:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:35:03 client -> Sending packet 3 (46 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:03 client Short Header{DestConnectionID: 543b6295f34469d32330d4747b409bd01b49de70, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:03 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 10, AckRanges: {{Largest: 16, Smallest: 14}, {Largest: 10, Smallest: 10}}, DelayTime: 145.471µs} 2025/04/30 10:35:03 client <- Reading packet 17 (144 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:03 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 80µs} 2025/04/30 10:35:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, StatelessResetToken: 0x7de5c70813d921114c4e47a0441bfb6f} 2025/04/30 10:35:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f122498045d597d3a5ce1cc5440cbbd82eba91e1, StatelessResetToken: 0xb3b4096efa40d40f6d94d1dc472bf369} 2025/04/30 10:35:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e9655e63f9e3fdf2a879c4722a55dafc7ed87a78, StatelessResetToken: 0x96f3b986f32e5103c76f95c31ba7f1f4} 2025/04/30 10:35:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:03 client Dropping Handshake keys. 2025/04/30 10:35:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:03 client -> Sending packet 5 (67 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:03 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:03 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 10, AckRanges: {{Largest: 17, Smallest: 14}, {Largest: 10, Smallest: 10}}, DelayTime: 131.075µs} 2025/04/30 10:35:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:03 client -> Sending packet 6 (60 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:03 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:04 client -> Sending packet 8 (60 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client -> Sending packet 9 (60 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client -> Sending packet 10 (1315 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.PingFrame{} 2025/04/30 10:35:04 client <- Reading packet 21 (1135 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 115.496ms} 2025/04/30 10:35:04 client newly acked packets (1): [9] 2025/04/30 10:35:04 client updated RTT: 44.988ms (σ: 34.856ms) 2025/04/30 10:35:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:04 client Canceling loss detection timer. 2025/04/30 10:35:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 2b2e620cb129f9708c4a79e9a2eafdd4affa1f7f, StatelessResetToken: 0xe0989d5d22751c3d896284bbcdacee9c} 2025/04/30 10:35:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 2b2e620cb129f9708c4a79e9a2eafdd4affa1f7f, StatelessResetToken: 0xe0989d5d22751c3d896284bbcdacee9c} 2025/04/30 10:35:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:04 client <- Reading packet 22 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 115.656ms} 2025/04/30 10:35:04 client <- &wire.PingFrame{} 2025/04/30 10:35:04 client -> Sending packet 11 (48 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 10, AckRanges: {{Largest: 22, Smallest: 21}, {Largest: 17, Smallest: 14}, {Largest: 10, Smallest: 10}}, DelayTime: 198.921µs} 2025/04/30 10:35:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:04 client -> Sending packet 12 (42 bytes) for connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 28707acab8720a3428800a1eff96fff94ce185be, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:04 client Connection 727e7cc46506541bb0ac5e6cf47396ae4b6ed9 closed. 2025/04/30 10:35:04 Requesting https://server4:443/sooysfgkyy. 2025/04/30 10:35:04 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:04 Increased send buffer size to 14336 kiB 2025/04/30 10:35:04 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:04 Created qlog file: /logs/qlog/005b80923660c6a3232f534fbf9c20dacb0f0e.sqlog 2025/04/30 10:35:04 client Starting new connection to server4 ([::]:49986 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 005b80923660c6a3232f534fbf9c20dacb0f0e, version v1 2025/04/30 10:35:04 Adding connection ID (empty). 2025/04/30 10:35:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:04 client -> Sending packet 0 (1280 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, Initial 2025/04/30 10:35:04 client Long Header{Type: Initial, DestConnectionID: 005b80923660c6a3232f534fbf9c20dacb0f0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:04 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:04 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:04 client Received first packet. Switching destination connection ID to: ecd6fcfad8af287f6910eae106e117f88e120383 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 10:35:04 client newly acked packets (1): [0] 2025/04/30 10:35:04 client updated RTT: 33.115647ms (σ: 16.557823ms) 2025/04/30 10:35:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:04 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 296 bytes. 2025/04/30 10:35:04 client <- Reading packet 1 (758 bytes) for connection (empty), Handshake 2025/04/30 10:35:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, PacketNumber: 1, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:35:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:35:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 005b80923660c6a3232f534fbf9c20dacb0f0e, InitialSourceConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:04 client Dropping %!s(logging.PacketType=5) packet (296 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e 2025/04/30 10:35:04 client Long Header{Type: Initial, DestConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:04 client Long Header{Type: Handshake, DestConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:04 client Dropping Initial keys. 2025/04/30 10:35:04 client -> Sending packet 1 (110 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, Handshake 2025/04/30 10:35:04 client Long Header{Type: Handshake, DestConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:04 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:04 client Short Header{DestConnectionID: ecd6fcfad8af287f6910eae106e117f88e120383, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, StatelessResetToken: 0x1be30687a1627fd66039143af24ecd2d} 2025/04/30 10:35:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bbc8cc538fef50fd8f1057b217ecc9cecafed7ba, StatelessResetToken: 0xe113b1e37131fdfe79f52aabe2be88db} 2025/04/30 10:35:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 48bab0b32419d13116366b05db97f2c60f2007de, StatelessResetToken: 0xec25734d559c228b0040750c75002419} 2025/04/30 10:35:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:04 client Dropping Handshake keys. 2025/04/30 10:35:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:04 client -> Sending packet 1 (46 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 118.02µs} 2025/04/30 10:35:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:04 client -> Sending packet 3 (58 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client Skipping packet number 2 2025/04/30 10:35:04 client -> Sending packet 4 (41 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:04 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 336.168ms} 2025/04/30 10:35:04 client <- &wire.PingFrame{} 2025/04/30 10:35:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:04 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 336.352ms} 2025/04/30 10:35:04 client <- &wire.PingFrame{} 2025/04/30 10:35:04 client -> Sending packet 5 (1315 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.PingFrame{} 2025/04/30 10:35:04 client -> Sending packet 6 (46 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 354.189µs} 2025/04/30 10:35:04 client <- Reading packet 7 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 80µs} 2025/04/30 10:35:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: e0f687dcfe81d0600fd9e59676d4a0cda82d6703, StatelessResetToken: 0x38c6b139072b70a6f92be96446fefffc} 2025/04/30 10:35:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:04 client Sending ACK because the ACK timer expired. 2025/04/30 10:35:04 client -> Sending packet 7 (47 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 25.295876ms} 2025/04/30 10:35:04 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:04 client -> Sending packet 9 (58 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client Skipping packet number 8 2025/04/30 10:35:04 client -> Sending packet 10 (41 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:04 client <- Reading packet 8 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}}, DelayTime: 104µs} 2025/04/30 10:35:04 client newly acked packets (1): [10] 2025/04/30 10:35:04 client updated RTT: 32.857ms (σ: 12.932ms) 2025/04/30 10:35:04 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:04 client lost packet 5 (time threshold) 2025/04/30 10:35:04 client setting loss timer for packet 9 (1-RTT) to 36.964125ms (in 2025-04-30 10:35:04.96953147 +0000 UTC m=+17.980219947) 2025/04/30 10:35:04 client -> Sending packet 11 (1297 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.PingFrame{} 2025/04/30 10:35:04 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:35:04.96953147 +0000 UTC m=+17.980219947 2025/04/30 10:35:04 client lost packet 9 (time threshold) 2025/04/30 10:35:04 client Canceling loss detection timer. 2025/04/30 10:35:04 client -> Sending packet 12 (58 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:04 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:04 client <- Reading packet 9 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:04 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:04 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 7, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 7, Smallest: 7}}, DelayTime: 64µs} 2025/04/30 10:35:04 client newly acked packets (1): [11] 2025/04/30 10:35:04 client updated RTT: 32.704ms (σ: 10.004ms) 2025/04/30 10:35:05 client <- Reading packet 10 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:05 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:05 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 7, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 7, Smallest: 7}}, DelayTime: 128µs} 2025/04/30 10:35:05 client newly acked packets (1): [12] 2025/04/30 10:35:05 client updated RTT: 32.546ms (σ: 7.817ms) 2025/04/30 10:35:05 client Canceling loss detection timer. 2025/04/30 10:35:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:05 client -> Sending packet 13 (42 bytes) for connection 005b80923660c6a3232f534fbf9c20dacb0f0e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:05 client Short Header{DestConnectionID: 3ef822f415e3ed3a221d30e5d13747da3fd1d217, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:05 client Connection 005b80923660c6a3232f534fbf9c20dacb0f0e closed. 2025/04/30 10:35:05 Requesting https://server4:443/tllsuflrit. 2025/04/30 10:35:05 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:05 Increased send buffer size to 14336 kiB 2025/04/30 10:35:05 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:05 Created qlog file: /logs/qlog/f7293461ef1bacf970cd417d1e14cb.sqlog 2025/04/30 10:35:05 client Starting new connection to server4 ([::]:41711 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f7293461ef1bacf970cd417d1e14cb, version v1 2025/04/30 10:35:05 Adding connection ID (empty). 2025/04/30 10:35:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:05 client -> Sending packet 0 (1280 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: f7293461ef1bacf970cd417d1e14cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:35:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:05 client -> Sending packet 1 (1280 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: f7293461ef1bacf970cd417d1e14cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:35:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:05 client -> Sending packet 2 (1280 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: f7293461ef1bacf970cd417d1e14cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:35:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:05 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:05 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:05 client Received first packet. Switching destination connection ID to: dfaf3bb6a7d938693ba8b3980b25179a9592a006 2025/04/30 10:35:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:05 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:05 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:05 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 10:35:05 client newly acked packets (1): [2] 2025/04/30 10:35:05 client updated RTT: 33.927249ms (σ: 16.963624ms) 2025/04/30 10:35:05 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:05 client -> Sending packet 3 (1280 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:05 client -> &wire.PingFrame{} 2025/04/30 10:35:05 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:05 client <- Reading packet 4 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:05 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 10:35:05 client newly acked packets (1): [3] 2025/04/30 10:35:05 client updated RTT: 33.795ms (σ: 12.986ms) 2025/04/30 10:35:05 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:05 client -> Sending packet 4 (1280 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:05 client -> &wire.PingFrame{} 2025/04/30 10:35:05 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:05 client <- Reading packet 5 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:05 client newly acked packets (1): [4] 2025/04/30 10:35:05 client updated RTT: 33.72ms (σ: 9.888ms) 2025/04/30 10:35:05 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:06 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:35:06 client <- Reading packet 6 (149 bytes) for connection (empty), Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:35:06 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 184.048ms} 2025/04/30 10:35:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:06 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:35:06 client -> Sending packet 5 (1280 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:06 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:35:06 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:06 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:06 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:06 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:06 client <- Reading packet 8 (754 bytes) for connection (empty), Handshake 2025/04/30 10:35:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, PacketNumber: 8, PacketNumberLen: 1, Length: 725, Version: v1} 2025/04/30 10:35:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:35:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f7293461ef1bacf970cd417d1e14cb, InitialSourceConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:06 client -> Sending packet 0 (91 bytes) for connection f7293461ef1bacf970cd417d1e14cb, Handshake 2025/04/30 10:35:06 client Long Header{Type: Handshake, DestConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:06 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:35:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:06 client Dropping Initial keys. 2025/04/30 10:35:06 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:06 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:06 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:06 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:06 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:06 client -> Sending packet 0 (58 bytes) for connection f7293461ef1bacf970cd417d1e14cb, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:06 client Short Header{DestConnectionID: dfaf3bb6a7d938693ba8b3980b25179a9592a006, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:06 client <- Reading packet 9 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:06 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168µs} 2025/04/30 10:35:06 client Peer doesn't await address validation any longer. 2025/04/30 10:35:06 client newly acked packets (1): [0] 2025/04/30 10:35:06 client updated RTT: 33.503ms (σ: 7.848ms) 2025/04/30 10:35:06 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:06 client Canceling loss detection timer. 2025/04/30 10:35:06 client Dropping Handshake keys. 2025/04/30 10:35:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 146df80731f77d0474c1ed35ea9d3f9e4e333a38, StatelessResetToken: 0x5300c36cd40501ca38188b404860d233} 2025/04/30 10:35:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fbc573051bdbf99df2684cc248887144dad114d9, StatelessResetToken: 0x7393d233bc26da0aaf261e672f9987dc} 2025/04/30 10:35:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b22fd858d7c9b125fd8e1f096c356831c1d2997, StatelessResetToken: 0x93f18d909722cc536f55d255d0fe752c} 2025/04/30 10:35:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:06 client -> Sending packet 1 (46 bytes) for connection f7293461ef1bacf970cd417d1e14cb, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:06 client Short Header{DestConnectionID: 146df80731f77d0474c1ed35ea9d3f9e4e333a38, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:06 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 164.838µs} 2025/04/30 10:35:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:06 client -> Sending packet 2 (42 bytes) for connection f7293461ef1bacf970cd417d1e14cb, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:06 client Short Header{DestConnectionID: 146df80731f77d0474c1ed35ea9d3f9e4e333a38, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:06 client Connection f7293461ef1bacf970cd417d1e14cb closed. 2025/04/30 10:35:06 Requesting https://server4:443/ghnuaelbfz. 2025/04/30 10:35:06 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:06 Increased send buffer size to 14336 kiB 2025/04/30 10:35:06 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:06 Created qlog file: /logs/qlog/54fedf731f72accc9452.sqlog 2025/04/30 10:35:06 client Starting new connection to server4 ([::]:42656 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 54fedf731f72accc9452, version v1 2025/04/30 10:35:06 Adding connection ID (empty). 2025/04/30 10:35:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:06 client -> Sending packet 0 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: 54fedf731f72accc9452, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:06 client -> Sending packet 1 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: 54fedf731f72accc9452, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:06 client -> Sending packet 2 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: 54fedf731f72accc9452, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:06 client -> Sending packet 3 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: 54fedf731f72accc9452, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:06 client -> Sending packet 4 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: 54fedf731f72accc9452, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:06 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:06 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:06 client Received first packet. Switching destination connection ID to: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1 2025/04/30 10:35:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs} 2025/04/30 10:35:06 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:06 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:06 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:06 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs} 2025/04/30 10:35:06 client newly acked packets (1): [4] 2025/04/30 10:35:06 client updated RTT: 33.944473ms (σ: 16.972236ms) 2025/04/30 10:35:06 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:07 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:07 client <- Reading packet 4 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 397.192ms} 2025/04/30 10:35:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:07 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:07 client -> Sending packet 5 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:07 client Long Header{Type: Initial, DestConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:07 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:35:07 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:07 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:07 client -> Sending packet 6 (1280 bytes) for connection 54fedf731f72accc9452, Initial 2025/04/30 10:35:07 client Long Header{Type: Initial, DestConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:07 client -> &wire.PingFrame{} 2025/04/30 10:35:08 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:08 client <- Reading packet 7 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, PacketNumber: 7, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:08 client <- &wire.PingFrame{} 2025/04/30 10:35:08 client -> Sending packet 0 (52 bytes) for connection 54fedf731f72accc9452, Handshake 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:08 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:35:08 client Dropping Initial keys. 2025/04/30 10:35:08 client <- Reading packet 8 (747 bytes) for connection (empty), Handshake 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, PacketNumber: 8, PacketNumberLen: 1, Length: 718, Version: v1} 2025/04/30 10:35:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 10:35:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 54fedf731f72accc9452, InitialSourceConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:08 client -> Sending packet 1 (91 bytes) for connection 54fedf731f72accc9452, Handshake 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:08 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:08 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:08 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:08 client -> Sending packet 0 (58 bytes) for connection 54fedf731f72accc9452, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:08 client Short Header{DestConnectionID: 744e1fcf7fdd9f450b6b89f9a0bc29f28f56d7c1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:08 client <- Reading packet 9 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:08 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:35:08 client Peer doesn't await address validation any longer. 2025/04/30 10:35:08 client newly acked packets (1): [0] 2025/04/30 10:35:08 client updated RTT: 33.702ms (σ: 13.212ms) 2025/04/30 10:35:08 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:08 client Canceling loss detection timer. 2025/04/30 10:35:08 client Dropping Handshake keys. 2025/04/30 10:35:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 53b4eead7460d1d38ccb70aaf17841adb162aa06, StatelessResetToken: 0xf9265b5707aee01a0121705b1c057333} 2025/04/30 10:35:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 45510ff9ee3e059cb38d61c9c10c293f3431d042, StatelessResetToken: 0x8c274e2e55211c5f80bb04ca291ea1a9} 2025/04/30 10:35:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 45ab0341760f1922354e77e0f43a58877b42e18b, StatelessResetToken: 0xade59f22350d6eec5443131fa3441a81} 2025/04/30 10:35:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:08 client -> Sending packet 1 (46 bytes) for connection 54fedf731f72accc9452, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:08 client Short Header{DestConnectionID: 53b4eead7460d1d38ccb70aaf17841adb162aa06, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:08 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 160.289µs} 2025/04/30 10:35:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:08 client -> Sending packet 2 (42 bytes) for connection 54fedf731f72accc9452, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:08 client Short Header{DestConnectionID: 53b4eead7460d1d38ccb70aaf17841adb162aa06, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:08 client Connection 54fedf731f72accc9452 closed. 2025/04/30 10:35:08 Requesting https://server4:443/vsnjpyckka. 2025/04/30 10:35:08 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:08 Increased send buffer size to 14336 kiB 2025/04/30 10:35:08 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:08 Created qlog file: /logs/qlog/8f12951023e82d25d5f71fde3d97a68ecb06.sqlog 2025/04/30 10:35:08 client Starting new connection to server4 ([::]:36138 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8f12951023e82d25d5f71fde3d97a68ecb06, version v1 2025/04/30 10:35:08 Adding connection ID (empty). 2025/04/30 10:35:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:08 client -> Sending packet 0 (1280 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Initial 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: 8f12951023e82d25d5f71fde3d97a68ecb06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:08 client -> Sending packet 1 (1280 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Initial 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: 8f12951023e82d25d5f71fde3d97a68ecb06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:08 client -> Sending packet 2 (1280 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Initial 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: 8f12951023e82d25d5f71fde3d97a68ecb06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:08 client -> Sending packet 3 (1280 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Initial 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: 8f12951023e82d25d5f71fde3d97a68ecb06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:08 client -> Sending packet 4 (1280 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Initial 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: 8f12951023e82d25d5f71fde3d97a68ecb06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:08 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:08 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:08 client Received first packet. Switching destination connection ID to: 9d51e67962dd945c6fb07c4480b70efb8e183582 2025/04/30 10:35:08 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 360µs} 2025/04/30 10:35:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:08 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 298 bytes. 2025/04/30 10:35:08 client <- Reading packet 1 (756 bytes) for connection (empty), Handshake 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, PacketNumber: 1, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:35:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:35:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8f12951023e82d25d5f71fde3d97a68ecb06, InitialSourceConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:08 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:08 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06 2025/04/30 10:35:08 client Long Header{Type: Initial, DestConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:08 client Dropping Initial keys. 2025/04/30 10:35:08 client -> Sending packet 1 (52 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Handshake 2025/04/30 10:35:08 client Long Header{Type: Handshake, DestConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:08 client -> Sending packet 0 (58 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:08 client Short Header{DestConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:09 client -> Sending packet 2 (86 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Handshake 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:09 client -> Sending packet 3 (86 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, Handshake 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: 9d51e67962dd945c6fb07c4480b70efb8e183582, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:09 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 392750f6cb43013db23bb5f123d73921122d5641, StatelessResetToken: 0xf6000912e8605ea293076c003fe2005a} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59173928c6ca095faab193bdf78b9d46eee2a947, StatelessResetToken: 0x6665df34bc9eb80f6e662153b465cc17} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cfa30316818d0b95cae4b2de506942c68eb3748f, StatelessResetToken: 0x9cf3d80d62c954417a093b9973e36eed} 2025/04/30 10:35:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:09 client Dropping Handshake keys. 2025/04/30 10:35:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:09 client -> Sending packet 2 (65 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: 392750f6cb43013db23bb5f123d73921122d5641, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 134.351µs} 2025/04/30 10:35:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client -> Sending packet 3 (60 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: 392750f6cb43013db23bb5f123d73921122d5641, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client -> Sending packet 4 (1315 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: 392750f6cb43013db23bb5f123d73921122d5641, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.PingFrame{} 2025/04/30 10:35:09 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 24µs} 2025/04/30 10:35:09 client newly acked packets (1): [3] 2025/04/30 10:35:09 client updated RTT: 32.071096ms (σ: 16.035548ms) 2025/04/30 10:35:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:09 client Canceling loss detection timer. 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 20d76097548e43286c043621b9162f8daae64ad9, StatelessResetToken: 0xedfd350e41939ff6063281c90bcd4058} 2025/04/30 10:35:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:09 client -> Sending packet 5 (42 bytes) for connection 8f12951023e82d25d5f71fde3d97a68ecb06, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: 392750f6cb43013db23bb5f123d73921122d5641, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:09 client Connection 8f12951023e82d25d5f71fde3d97a68ecb06 closed. 2025/04/30 10:35:09 Requesting https://server4:443/kfhqmxoazr. 2025/04/30 10:35:09 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:09 Increased send buffer size to 14336 kiB 2025/04/30 10:35:09 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:09 Created qlog file: /logs/qlog/e1b062252d3b08e47cd989a9abe8bea8.sqlog 2025/04/30 10:35:09 client Starting new connection to server4 ([::]:37210 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e1b062252d3b08e47cd989a9abe8bea8, version v1 2025/04/30 10:35:09 Adding connection ID (empty). 2025/04/30 10:35:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:09 client -> Sending packet 0 (1280 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, Initial 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: e1b062252d3b08e47cd989a9abe8bea8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:09 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:09 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:09 client Received first packet. Switching destination connection ID to: 17858e4337df94026ad973b75e97b4ebe2ac9a08 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 10:35:09 client newly acked packets (1): [0] 2025/04/30 10:35:09 client updated RTT: 33.230669ms (σ: 16.615334ms) 2025/04/30 10:35:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 301 bytes. 2025/04/30 10:35:09 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, PacketNumber: 1, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e1b062252d3b08e47cd989a9abe8bea8, InitialSourceConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:09 client Dropping %!s(logging.PacketType=5) packet (301 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:09 client Dropping Initial keys. 2025/04/30 10:35:09 client -> Sending packet 1 (110 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, Handshake 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:09 client Short Header{DestConnectionID: 17858e4337df94026ad973b75e97b4ebe2ac9a08, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, StatelessResetToken: 0xebd6fa51fa93ac5f4243a52a6f4d2c7f} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 26a259487580d4029d7472d51d613eb9f16b82c5, StatelessResetToken: 0xe94954c212c1645570e186568d394b55} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 39619c681ab350c45f5f31f605cc006f49a94193, StatelessResetToken: 0x5eebc5274ec4d50a7a040dfd732c98a5} 2025/04/30 10:35:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:09 client Dropping Handshake keys. 2025/04/30 10:35:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:09 client -> Sending packet 1 (46 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 109.555µs} 2025/04/30 10:35:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:09 client -> Sending packet 3 (58 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client Skipping packet number 2 2025/04/30 10:35:09 client -> Sending packet 4 (41 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:09 client -> Sending packet 6 (58 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client Skipping packet number 5 2025/04/30 10:35:09 client -> Sending packet 7 (41 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:09 client -> Sending packet 8 (1315 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.PingFrame{} 2025/04/30 10:35:09 client <- Reading packet 5 (65 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 88µs} 2025/04/30 10:35:09 client newly acked packets (1): [7] 2025/04/30 10:35:09 client updated RTT: 32.974ms (σ: 12.973ms) 2025/04/30 10:35:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:09 client setting loss timer for packet 6 (1-RTT) to 37.09575ms (in 2025-04-30 10:35:09.579020101 +0000 UTC m=+22.589708598) 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b2d0fc9ab14820a1f5405bc0cc6c445b9a459bb6, StatelessResetToken: 0x23beb015704930d56f95d97650a1ec46} 2025/04/30 10:35:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:09 client -> Sending packet 9 (46 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 172.201µs} 2025/04/30 10:35:09 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 56µs} 2025/04/30 10:35:09 client newly acked packets (1): [8] 2025/04/30 10:35:09 client updated RTT: 32.85ms (σ: 9.976ms) 2025/04/30 10:35:09 client setting loss timer for packet 6 (1-RTT) to 36.95625ms (in 2025-04-30 10:35:09.578880601 +0000 UTC m=+22.589569098) 2025/04/30 10:35:09 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:35:09.578880601 +0000 UTC m=+22.589569098 2025/04/30 10:35:09 client lost packet 6 (time threshold) 2025/04/30 10:35:09 client Canceling loss detection timer. 2025/04/30 10:35:09 client -> Sending packet 10 (58 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client <- Reading packet 7 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 48µs} 2025/04/30 10:35:09 client newly acked packets (1): [10] 2025/04/30 10:35:09 client updated RTT: 32.587ms (σ: 8.007ms) 2025/04/30 10:35:09 client Canceling loss detection timer. 2025/04/30 10:35:09 client <- Reading packet 8 (1059 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 216.56ms} 2025/04/30 10:35:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:09 client <- Reading packet 9 (31 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 216.752ms} 2025/04/30 10:35:09 client <- &wire.PingFrame{} 2025/04/30 10:35:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:35:09 client -> Sending packet 11 (1332 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.PingFrame{} 2025/04/30 10:35:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:09 client -> Sending packet 12 (42 bytes) for connection e1b062252d3b08e47cd989a9abe8bea8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: d1587b2b2da8d6533dfe47dd2fb664a833915b7c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:09 client Connection e1b062252d3b08e47cd989a9abe8bea8 closed. 2025/04/30 10:35:09 Requesting https://server4:443/ecuioueokn. 2025/04/30 10:35:09 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:09 Increased send buffer size to 14336 kiB 2025/04/30 10:35:09 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:09 Created qlog file: /logs/qlog/59f425f7daced157b0183cdcb0.sqlog 2025/04/30 10:35:09 client Starting new connection to server4 ([::]:38403 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 59f425f7daced157b0183cdcb0, version v1 2025/04/30 10:35:09 Adding connection ID (empty). 2025/04/30 10:35:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:09 client -> Sending packet 0 (1280 bytes) for connection 59f425f7daced157b0183cdcb0, Initial 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: 59f425f7daced157b0183cdcb0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:35:09 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:09 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:09 client Received first packet. Switching destination connection ID to: 28e82e92d8cac17b5bc3cade3c5b686e545a3360 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:35:09 client newly acked packets (1): [0] 2025/04/30 10:35:09 client updated RTT: 33.2683ms (σ: 16.63415ms) 2025/04/30 10:35:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Parsed a coalesced packet. Part 2: 750 bytes. Remaining: 304 bytes. 2025/04/30 10:35:09 client <- Reading packet 1 (750 bytes) for connection (empty), Handshake 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, PacketNumber: 1, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:35:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:35:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 59f425f7daced157b0183cdcb0, InitialSourceConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:09 client Dropping %!s(logging.PacketType=5) packet (304 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 59f425f7daced157b0183cdcb0 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:09 client Dropping Initial keys. 2025/04/30 10:35:09 client -> Sending packet 1 (52 bytes) for connection 59f425f7daced157b0183cdcb0, Handshake 2025/04/30 10:35:09 client Long Header{Type: Handshake, DestConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:09 client -> Sending packet 0 (58 bytes) for connection 59f425f7daced157b0183cdcb0, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:09 client Short Header{DestConnectionID: 28e82e92d8cac17b5bc3cade3c5b686e545a3360, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:09 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:35:09 client Peer doesn't await address validation any longer. 2025/04/30 10:35:09 client newly acked packets (1): [0] 2025/04/30 10:35:09 client updated RTT: 33.219ms (σ: 12.571ms) 2025/04/30 10:35:09 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:09 client Canceling loss detection timer. 2025/04/30 10:35:09 client Dropping Handshake keys. 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cf86a30fdc731fc50ac0c2fc656a9b366de4437f, StatelessResetToken: 0x9a8845454d9562afe5108ce077399ecb} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 762d98a97700edcc81b9d92492f3201959f9522d, StatelessResetToken: 0x17d563281746b52c936e64e8a8160fd0} 2025/04/30 10:35:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c100aaceccb015830bac42ae65ff89566e857b45, StatelessResetToken: 0x4eb555797810096a690e43750916c243} 2025/04/30 10:35:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:09 client -> Sending packet 1 (46 bytes) for connection 59f425f7daced157b0183cdcb0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: cf86a30fdc731fc50ac0c2fc656a9b366de4437f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 155.741µs} 2025/04/30 10:35:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:09 client -> Sending packet 2 (42 bytes) for connection 59f425f7daced157b0183cdcb0, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:09 client Short Header{DestConnectionID: cf86a30fdc731fc50ac0c2fc656a9b366de4437f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:09 client Connection 59f425f7daced157b0183cdcb0 closed. 2025/04/30 10:35:09 Requesting https://server4:443/vmcqjrpxph. 2025/04/30 10:35:09 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:09 Increased send buffer size to 14336 kiB 2025/04/30 10:35:09 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:09 Created qlog file: /logs/qlog/bfef39ff37e1540a067fcb5d.sqlog 2025/04/30 10:35:09 client Starting new connection to server4 ([::]:58846 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bfef39ff37e1540a067fcb5d, version v1 2025/04/30 10:35:09 Adding connection ID (empty). 2025/04/30 10:35:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:09 client -> Sending packet 0 (1280 bytes) for connection bfef39ff37e1540a067fcb5d, Initial 2025/04/30 10:35:09 client Long Header{Type: Initial, DestConnectionID: bfef39ff37e1540a067fcb5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:10 client -> Sending packet 1 (1280 bytes) for connection bfef39ff37e1540a067fcb5d, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: bfef39ff37e1540a067fcb5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:10 client -> Sending packet 2 (1280 bytes) for connection bfef39ff37e1540a067fcb5d, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: bfef39ff37e1540a067fcb5d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:10 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:10 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:10 client Received first packet. Switching destination connection ID to: fe839d019c415c6853b41ed9c3b25ec67116e5a1 2025/04/30 10:35:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 392µs} 2025/04/30 10:35:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:10 client Parsed a coalesced packet. Part 2: 749 bytes. Remaining: 305 bytes. 2025/04/30 10:35:10 client <- Reading packet 1 (749 bytes) for connection (empty), Handshake 2025/04/30 10:35:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, PacketNumber: 1, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:35:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:35:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bfef39ff37e1540a067fcb5d, InitialSourceConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:10 client Dropping %!s(logging.PacketType=5) packet (305 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:10 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bfef39ff37e1540a067fcb5d 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:10 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:10 client Long Header{Type: Handshake, DestConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:10 client Dropping Initial keys. 2025/04/30 10:35:10 client -> Sending packet 1 (110 bytes) for connection bfef39ff37e1540a067fcb5d, Handshake 2025/04/30 10:35:10 client Long Header{Type: Handshake, DestConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:10 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:10 client Short Header{DestConnectionID: fe839d019c415c6853b41ed9c3b25ec67116e5a1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:10 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:10 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 10:35:10 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:10 client <- Reading packet 3 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:10 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, StatelessResetToken: 0x9601ca7184ea03487a1a345e12343061} 2025/04/30 10:35:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 686ad0f3388cb2f90963e5068e227b3d66564aac, StatelessResetToken: 0xea2fde50f876427426f1a31bc49ff326} 2025/04/30 10:35:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d92d0b955ca5341f68d245e561bd1915fb9ed985, StatelessResetToken: 0x4544fee9e222d14c8df56c7d785e78ac} 2025/04/30 10:35:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:10 client Dropping Handshake keys. 2025/04/30 10:35:10 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:10 client -> Sending packet 1 (1315 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.PingFrame{} 2025/04/30 10:35:10 client -> Sending packet 2 (46 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 187.39µs} 2025/04/30 10:35:10 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:10 client <- Reading packet 4 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:10 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112µs} 2025/04/30 10:35:10 client newly acked packets (1): [2] 2025/04/30 10:35:10 client updated RTT: 32.028039ms (σ: 16.014019ms) 2025/04/30 10:35:10 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:10 client lost packet 0 (time threshold) 2025/04/30 10:35:10 client setting loss timer for packet 1 (1-RTT) to 36.031543ms (in 2025-04-30 10:35:10.199715261 +0000 UTC m=+23.210403748) 2025/04/30 10:35:10 client Canceling loss detection timer. 2025/04/30 10:35:10 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 869bee3558557ad8f0d0a177f2bf0ea0eccfc4ee, StatelessResetToken: 0xefc2ceb33b9d20289cd0e26ad11e2ec6} 2025/04/30 10:35:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:10 client Ignoring all packets below 4. 2025/04/30 10:35:10 client -> Sending packet 3 (63 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 211.664µs} 2025/04/30 10:35:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:10 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:35:10.199715261 +0000 UTC m=+23.210403748 2025/04/30 10:35:10 client lost packet 1 (time threshold) 2025/04/30 10:35:10 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:10 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112.16ms} 2025/04/30 10:35:10 client <- &wire.PingFrame{} 2025/04/30 10:35:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:10 client -> Sending packet 5 (64 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 10.153101ms} 2025/04/30 10:35:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:10 client -> Sending packet 6 (58 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:10 client <- Reading packet 6 (1052 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:10 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:10 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 184µs} 2025/04/30 10:35:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:10 client -> Sending packet 7 (1297 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.PingFrame{} 2025/04/30 10:35:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:10 client -> Sending packet 8 (42 bytes) for connection bfef39ff37e1540a067fcb5d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:10 client Short Header{DestConnectionID: d8c50ad4ffe5ed6225c2e100650b81d5682921e9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:10 client Connection bfef39ff37e1540a067fcb5d closed. 2025/04/30 10:35:10 Requesting https://server4:443/cmmyqehlhb. 2025/04/30 10:35:10 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:10 Increased send buffer size to 14336 kiB 2025/04/30 10:35:10 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:10 Created qlog file: /logs/qlog/8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3.sqlog 2025/04/30 10:35:10 client Starting new connection to server4 ([::]:46488 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, version v1 2025/04/30 10:35:10 Adding connection ID (empty). 2025/04/30 10:35:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:10 client -> Sending packet 0 (1280 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:10 client -> Sending packet 1 (1280 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:10 client -> Sending packet 2 (1280 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:10 client -> Sending packet 3 (1280 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:10 client -> Sending packet 4 (1280 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:10 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:10 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:10 client Received first packet. Switching destination connection ID to: 28828f564e907db6a52b90aea0c5af0fe7072011 2025/04/30 10:35:10 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 120µs} 2025/04/30 10:35:10 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:10 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:10 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:10 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 64µs} 2025/04/30 10:35:10 client newly acked packets (1): [4] 2025/04/30 10:35:10 client updated RTT: 33.990908ms (σ: 16.995454ms) 2025/04/30 10:35:10 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:11 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:11 client <- Reading packet 5 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 397.936ms} 2025/04/30 10:35:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:11 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:11 client -> Sending packet 5 (1280 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Initial 2025/04/30 10:35:11 client Long Header{Type: Initial, DestConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:11 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:35:11 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:11 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:11 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:11 client <- Reading packet 6 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:11 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 136µs} 2025/04/30 10:35:11 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:11 client <- Reading packet 7 (755 bytes) for connection (empty), Handshake 2025/04/30 10:35:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, PacketNumber: 7, PacketNumberLen: 1, Length: 726, Version: v1} 2025/04/30 10:35:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:35:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, InitialSourceConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:11 client -> Sending packet 0 (91 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, Handshake 2025/04/30 10:35:11 client Long Header{Type: Handshake, DestConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:11 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:35:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:11 client Dropping Initial keys. 2025/04/30 10:35:11 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:11 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:11 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:11 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:11 client -> Sending packet 0 (58 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:11 client Short Header{DestConnectionID: 28828f564e907db6a52b90aea0c5af0fe7072011, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:11 client <- Reading packet 8 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:11 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f5f6ee2d1096455b361029b78019334d678cd9f6, StatelessResetToken: 0xa0ada0a2084d426f67aa3e704a9a3448} 2025/04/30 10:35:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 947831210b8816e980469e223b192676e6d74b9d, StatelessResetToken: 0x9127c3c7a3da93dc5e49ac027a7f5ce3} 2025/04/30 10:35:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e9487ee12be1233f5257d2265acd4045150539c6, StatelessResetToken: 0x001b43b704c9112823e006a35eb153f7} 2025/04/30 10:35:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:11 client Dropping Handshake keys. 2025/04/30 10:35:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:11 client -> Sending packet 1 (46 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:11 client Short Header{DestConnectionID: f5f6ee2d1096455b361029b78019334d678cd9f6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:11 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 127.217µs} 2025/04/30 10:35:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:11 client <- Reading packet 9 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:11 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:11 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112µs} 2025/04/30 10:35:11 client newly acked packets (1): [1] 2025/04/30 10:35:11 client updated RTT: 33.614ms (σ: 13.497ms) 2025/04/30 10:35:11 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:11 client lost packet 0 (time threshold) 2025/04/30 10:35:11 client Canceling loss detection timer. 2025/04/30 10:35:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 1ef477704077fc8dc3c7db734a8a23104ca28a05, StatelessResetToken: 0xb55dc40de23321d70b6620c88dc47f91} 2025/04/30 10:35:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:11 client Ignoring all packets below 9. 2025/04/30 10:35:11 client -> Sending packet 2 (63 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:11 client Short Header{DestConnectionID: f5f6ee2d1096455b361029b78019334d678cd9f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:11 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 181.839µs} 2025/04/30 10:35:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:11 client <- Reading packet 10 (1052 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:11 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 152µs} 2025/04/30 10:35:11 client newly acked packets (1): [2] 2025/04/30 10:35:11 client updated RTT: 33.363ms (σ: 10.624ms) 2025/04/30 10:35:11 client Canceling loss detection timer. 2025/04/30 10:35:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:11 client Ignoring all packets below 10. 2025/04/30 10:35:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:11 client -> Sending packet 3 (42 bytes) for connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:11 client Short Header{DestConnectionID: f5f6ee2d1096455b361029b78019334d678cd9f6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:11 client Connection 8c21b2c9f1bb2f6b8d8e04f34e3a4497e4a3 closed. 2025/04/30 10:35:11 Requesting https://server4:443/whtaooyiem. 2025/04/30 10:35:11 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:11 Increased send buffer size to 14336 kiB 2025/04/30 10:35:11 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:11 Created qlog file: /logs/qlog/f86b17fb2aaf486bc51608.sqlog 2025/04/30 10:35:11 client Starting new connection to server4 ([::]:43718 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f86b17fb2aaf486bc51608, version v1 2025/04/30 10:35:11 Adding connection ID (empty). 2025/04/30 10:35:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:11 client -> Sending packet 0 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:11 client Long Header{Type: Initial, DestConnectionID: f86b17fb2aaf486bc51608, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:11 client -> Sending packet 1 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:11 client Long Header{Type: Initial, DestConnectionID: f86b17fb2aaf486bc51608, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:11 client -> Sending packet 2 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:11 client Long Header{Type: Initial, DestConnectionID: f86b17fb2aaf486bc51608, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:12 client -> Sending packet 3 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: f86b17fb2aaf486bc51608, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:12 client -> Sending packet 4 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: f86b17fb2aaf486bc51608, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:12 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:12 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:12 client Received first packet. Switching destination connection ID to: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8 2025/04/30 10:35:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 88µs} 2025/04/30 10:35:12 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:12 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:35:12 client <- Reading packet 3 (149 bytes) for connection (empty), Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:35:12 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 600.6ms} 2025/04/30 10:35:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:12 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:35:12 client -> Sending packet 5 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:12 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:35:12 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:35:12 client -> Sending packet 6 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:12 client -> Sending packet 7 (1280 bytes) for connection f86b17fb2aaf486bc51608, Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:12 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:12 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:12 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 136µs} 2025/04/30 10:35:12 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:12 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:12 client <- Reading packet 5 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:12 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 64µs} 2025/04/30 10:35:12 client newly acked packets (1): [7] 2025/04/30 10:35:12 client updated RTT: 34.042394ms (σ: 17.021197ms) 2025/04/30 10:35:12 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:13 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:13 client <- Reading packet 6 (750 bytes) for connection (empty), Handshake 2025/04/30 10:35:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, PacketNumber: 6, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:35:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:35:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f86b17fb2aaf486bc51608, InitialSourceConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:13 client <- Reading packet 7 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, PacketNumber: 7, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:13 client <- &wire.PingFrame{} 2025/04/30 10:35:13 client -> Sending packet 0 (91 bytes) for connection f86b17fb2aaf486bc51608, Handshake 2025/04/30 10:35:13 client Long Header{Type: Handshake, DestConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:13 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 0s} 2025/04/30 10:35:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:13 client Dropping Initial keys. 2025/04/30 10:35:13 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:13 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:13 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:13 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:13 client -> Sending packet 0 (58 bytes) for connection f86b17fb2aaf486bc51608, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 6cb845b28c81571bc6ff306e8cb23157c2b6b9a8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:13 client <- Reading packet 8 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:13 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:35:13 client Peer doesn't await address validation any longer. 2025/04/30 10:35:13 client newly acked packets (1): [0] 2025/04/30 10:35:13 client updated RTT: 33.788ms (σ: 13.273ms) 2025/04/30 10:35:13 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:13 client Canceling loss detection timer. 2025/04/30 10:35:13 client Dropping Handshake keys. 2025/04/30 10:35:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03ade6a6aced6de796127847fcbc7fa9ba1e5bf3, StatelessResetToken: 0xd4ff457cfaefa6a408ff3b4147271649} 2025/04/30 10:35:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e08351ad56031af26f504f8b29e8198823f4674, StatelessResetToken: 0x017b593c95d7232172b67234fba624eb} 2025/04/30 10:35:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d9b4562edb7de77304ffff4a1f4f407cf41ff23c, StatelessResetToken: 0x7c8740ab1ddb6ac21adecae6765d7eb8} 2025/04/30 10:35:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:13 client -> Sending packet 1 (46 bytes) for connection f86b17fb2aaf486bc51608, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 03ade6a6aced6de796127847fcbc7fa9ba1e5bf3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 191.827µs} 2025/04/30 10:35:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:13 client -> Sending packet 2 (42 bytes) for connection f86b17fb2aaf486bc51608, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 03ade6a6aced6de796127847fcbc7fa9ba1e5bf3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:13 client Connection f86b17fb2aaf486bc51608 closed. 2025/04/30 10:35:13 Requesting https://server4:443/sxxaavfokg. 2025/04/30 10:35:13 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:13 Increased send buffer size to 14336 kiB 2025/04/30 10:35:13 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:13 Created qlog file: /logs/qlog/db7dc1bcfd8321a5.sqlog 2025/04/30 10:35:13 client Starting new connection to server4 ([::]:42772 -> 193.167.100.100:443), source connection ID (empty), destination connection ID db7dc1bcfd8321a5, version v1 2025/04/30 10:35:13 Adding connection ID (empty). 2025/04/30 10:35:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:13 client -> Sending packet 0 (1280 bytes) for connection db7dc1bcfd8321a5, Initial 2025/04/30 10:35:13 client Long Header{Type: Initial, DestConnectionID: db7dc1bcfd8321a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 10:35:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:13 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:13 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:13 client Received first packet. Switching destination connection ID to: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3 2025/04/30 10:35:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 10:35:13 client newly acked packets (1): [0] 2025/04/30 10:35:13 client updated RTT: 33.025449ms (σ: 16.512724ms) 2025/04/30 10:35:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:13 client Parsed a coalesced packet. Part 2: 746 bytes. Remaining: 308 bytes. 2025/04/30 10:35:13 client <- Reading packet 1 (746 bytes) for connection (empty), Handshake 2025/04/30 10:35:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, PacketNumber: 1, PacketNumberLen: 1, Length: 717, Version: v1} 2025/04/30 10:35:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:35:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: db7dc1bcfd8321a5, InitialSourceConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:13 client Dropping %!s(logging.PacketType=5) packet (308 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection db7dc1bcfd8321a5 2025/04/30 10:35:13 client Long Header{Type: Initial, DestConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:13 client Long Header{Type: Handshake, DestConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:13 client Dropping Initial keys. 2025/04/30 10:35:13 client -> Sending packet 1 (110 bytes) for connection db7dc1bcfd8321a5, Handshake 2025/04/30 10:35:13 client Long Header{Type: Handshake, DestConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:13 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:13 client Short Header{DestConnectionID: 08fc77e878d6a7d86cf665bb7c3f37f29c948af3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:13 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 926b819ab62fd4cb03d6acbe74a68c5d24c8f0ad, StatelessResetToken: 0xdcae76408e9a08a7a62c6a9170a6af05} 2025/04/30 10:35:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 423ca56a9e67cf4dbeb425332760a5e96b7ba24c, StatelessResetToken: 0xaf0e44f0f88ac1f26c36833ced4ef8a7} 2025/04/30 10:35:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a983a3fa3494d688b00fd240da47fadeda86ab77, StatelessResetToken: 0x54f00f28e88da44fe8c6f31b742f39c5} 2025/04/30 10:35:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:13 client Dropping Handshake keys. 2025/04/30 10:35:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:13 client -> Sending packet 1 (46 bytes) for connection db7dc1bcfd8321a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 926b819ab62fd4cb03d6acbe74a68c5d24c8f0ad, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 124.302µs} 2025/04/30 10:35:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:13 client -> Sending packet 3 (58 bytes) for connection db7dc1bcfd8321a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 926b819ab62fd4cb03d6acbe74a68c5d24c8f0ad, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:13 client Skipping packet number 2 2025/04/30 10:35:13 client -> Sending packet 4 (41 bytes) for connection db7dc1bcfd8321a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 926b819ab62fd4cb03d6acbe74a68c5d24c8f0ad, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:13 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:13 client <- &wire.PingFrame{} 2025/04/30 10:35:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:13 client Sending ACK because the ACK timer expired. 2025/04/30 10:35:13 client -> Sending packet 5 (45 bytes) for connection db7dc1bcfd8321a5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:13 client Short Header{DestConnectionID: 926b819ab62fd4cb03d6acbe74a68c5d24c8f0ad, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:13 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.251752ms} 2025/04/30 10:35:14 client <- Reading packet 4 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:14 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 64µs} 2025/04/30 10:35:14 client newly acked packets (2): [3 4] 2025/04/30 10:35:14 client updated RTT: 32.882ms (σ: 12.669ms) 2025/04/30 10:35:14 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:14 client Canceling loss detection timer. 2025/04/30 10:35:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 63353b0f175ba25e70c9917468fd5443b09a0423, StatelessResetToken: 0xa25ba8f586a57cbacdb3267517f5a1e2} 2025/04/30 10:35:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:14 client -> Sending packet 6 (42 bytes) for connection db7dc1bcfd8321a5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:14 client Short Header{DestConnectionID: 926b819ab62fd4cb03d6acbe74a68c5d24c8f0ad, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:14 client Connection db7dc1bcfd8321a5 closed. 2025/04/30 10:35:14 Requesting https://server4:443/ywoxuleyjg. 2025/04/30 10:35:14 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:14 Increased send buffer size to 14336 kiB 2025/04/30 10:35:14 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:14 Created qlog file: /logs/qlog/b1becfd840f870ca871b.sqlog 2025/04/30 10:35:14 client Starting new connection to server4 ([::]:56474 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b1becfd840f870ca871b, version v1 2025/04/30 10:35:14 Adding connection ID (empty). 2025/04/30 10:35:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:14 client -> Sending packet 0 (1280 bytes) for connection b1becfd840f870ca871b, Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: b1becfd840f870ca871b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 10:35:14 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:14 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:14 client Received first packet. Switching destination connection ID to: cb80b4a5c5f89991418fed9573eebd2fdce22fcd 2025/04/30 10:35:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 10:35:14 client newly acked packets (1): [0] 2025/04/30 10:35:14 client updated RTT: 33.057275ms (σ: 16.528637ms) 2025/04/30 10:35:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:14 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 306 bytes. 2025/04/30 10:35:14 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, PacketNumber: 1, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:35:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:35:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b1becfd840f870ca871b, InitialSourceConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:14 client Dropping %!s(logging.PacketType=5) packet (306 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b1becfd840f870ca871b 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:14 client Dropping Initial keys. 2025/04/30 10:35:14 client -> Sending packet 1 (52 bytes) for connection b1becfd840f870ca871b, Handshake 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:14 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:14 client -> Sending packet 0 (58 bytes) for connection b1becfd840f870ca871b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:14 client Short Header{DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:14 client -> Sending packet 2 (86 bytes) for connection b1becfd840f870ca871b, Handshake 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:14 client -> Sending packet 3 (86 bytes) for connection b1becfd840f870ca871b, Handshake 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:14 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:14 client -> Sending packet 4 (86 bytes) for connection b1becfd840f870ca871b, Handshake 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:14 client -> Sending packet 5 (86 bytes) for connection b1becfd840f870ca871b, Handshake 2025/04/30 10:35:14 client Long Header{Type: Handshake, DestConnectionID: cb80b4a5c5f89991418fed9573eebd2fdce22fcd, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:14 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:14 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36a449fb4307bc6d3ab6a888e10b383dfb09266e, StatelessResetToken: 0x466fc4cac9387f0d91a4d083dcd36d35} 2025/04/30 10:35:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f3c37cf3ea658ee3ff5c8677f36142a01145681, StatelessResetToken: 0xae40be182b2f10de1a7c7243bcb5a411} 2025/04/30 10:35:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9a1140d47db445401d4b1d39c819d5e8c928b4fc, StatelessResetToken: 0x7e15aa8ec6fd90779694b04117daf5f2} 2025/04/30 10:35:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:14 client Dropping Handshake keys. 2025/04/30 10:35:14 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:14 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:14 client -> Sending packet 2 (65 bytes) for connection b1becfd840f870ca871b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:14 client Short Header{DestConnectionID: 36a449fb4307bc6d3ab6a888e10b383dfb09266e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:14 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 168.274µs} 2025/04/30 10:35:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:14 client -> Sending packet 3 (60 bytes) for connection b1becfd840f870ca871b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:14 client Short Header{DestConnectionID: 36a449fb4307bc6d3ab6a888e10b383dfb09266e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:14 client <- Reading packet 4 (1093 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:14 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 112.448ms} 2025/04/30 10:35:14 client newly acked packets (1): [3] 2025/04/30 10:35:14 client updated RTT: 43.835ms (σ: 33.953ms) 2025/04/30 10:35:14 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:14 client Canceling loss detection timer. 2025/04/30 10:35:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b804de477fb8f4b2f01518e56f4b31f29b126f4e, StatelessResetToken: 0x2c0763bacc8cdfef64ab43c771e8d141} 2025/04/30 10:35:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:14 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:14 client -> Sending packet 4 (46 bytes) for connection b1becfd840f870ca871b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:14 client Short Header{DestConnectionID: 36a449fb4307bc6d3ab6a888e10b383dfb09266e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:14 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 141.013µs} 2025/04/30 10:35:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:14 client -> Sending packet 5 (42 bytes) for connection b1becfd840f870ca871b, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:14 client Short Header{DestConnectionID: 36a449fb4307bc6d3ab6a888e10b383dfb09266e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:14 client Connection b1becfd840f870ca871b closed. 2025/04/30 10:35:14 Requesting https://server4:443/jgmjbavpfs. 2025/04/30 10:35:14 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:14 Increased send buffer size to 14336 kiB 2025/04/30 10:35:14 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:14 Created qlog file: /logs/qlog/b00873189d11df07606c2cc221f9.sqlog 2025/04/30 10:35:14 client Starting new connection to server4 ([::]:39875 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b00873189d11df07606c2cc221f9, version v1 2025/04/30 10:35:14 Adding connection ID (empty). 2025/04/30 10:35:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:14 client -> Sending packet 0 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: b00873189d11df07606c2cc221f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:14 client -> Sending packet 1 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: b00873189d11df07606c2cc221f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:14 client -> Sending packet 2 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: b00873189d11df07606c2cc221f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:14 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:14 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:14 client Received first packet. Switching destination connection ID to: 0d0adb4e152a43006b1f8c20621c0e9615bc9234 2025/04/30 10:35:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 120µs} 2025/04/30 10:35:14 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:14 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:14 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:14 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 10:35:14 client newly acked packets (1): [2] 2025/04/30 10:35:14 client updated RTT: 33.811089ms (σ: 16.905544ms) 2025/04/30 10:35:14 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:14 client -> Sending packet 3 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:14 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:14 client -> &wire.PingFrame{} 2025/04/30 10:35:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:35:15 client -> Sending packet 4 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:15 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:15 client -> &wire.PingFrame{} 2025/04/30 10:35:15 client -> Sending packet 5 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:15 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:15 client -> &wire.PingFrame{} 2025/04/30 10:35:15 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:15 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:15 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 152µs} 2025/04/30 10:35:15 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:35:16 client -> Sending packet 6 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:16 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:16 client -> &wire.PingFrame{} 2025/04/30 10:35:16 client -> Sending packet 7 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:16 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:16 client -> &wire.PingFrame{} 2025/04/30 10:35:16 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:35:16 client <- Reading packet 6 (56 bytes) for connection (empty), Initial 2025/04/30 10:35:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:35:16 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 160µs} 2025/04/30 10:35:16 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:35:16 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:16 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:35:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/04/30 10:35:17 client -> Sending packet 8 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:17 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:17 client -> &wire.PingFrame{} 2025/04/30 10:35:17 client -> Sending packet 9 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:17 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:17 client -> &wire.PingFrame{} 2025/04/30 10:35:17 client Parsed a coalesced packet. Part 1: 58 bytes. Remaining: 1142 bytes. 2025/04/30 10:35:17 client <- Reading packet 10 (58 bytes) for connection (empty), Initial 2025/04/30 10:35:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 28, Version: v1} 2025/04/30 10:35:17 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 10:35:17 client newly acked packets (1): [9] 2025/04/30 10:35:17 client updated RTT: 33.804ms (σ: 12.692ms) 2025/04/30 10:35:17 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:35:18 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:19 client Parsed a coalesced packet. Part 1: 155 bytes. Remaining: 1045 bytes. 2025/04/30 10:35:19 client <- Reading packet 11 (155 bytes) for connection (empty), Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 125, Version: v1} 2025/04/30 10:35:19 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 1.71652s} 2025/04/30 10:35:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:19 client Queueing packet (1045 bytes) for later decryption 2025/04/30 10:35:19 client -> Sending packet 10 (1280 bytes) for connection b00873189d11df07606c2cc221f9, Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:19 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:19 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:19 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:19 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:19 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:35:19 client <- Reading packet 8 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, PacketNumber: 8, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:19 client <- &wire.PingFrame{} 2025/04/30 10:35:19 client Queueing packet (1142 bytes) for later decryption 2025/04/30 10:35:19 client -> Sending packet 0 (52 bytes) for connection b00873189d11df07606c2cc221f9, Handshake 2025/04/30 10:35:19 client Long Header{Type: Handshake, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:19 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:35:19 client Dropping Initial keys. 2025/04/30 10:35:19 client Parsed a coalesced packet. Part 1: 62 bytes. Remaining: 1138 bytes. 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=0) packet (62 bytes) because we already dropped the keys. 2025/04/30 10:35:19 client Queueing packet (1138 bytes) for later decryption 2025/04/30 10:35:19 client <- Reading packet 13 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, PacketNumber: 13, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b00873189d11df07606c2cc221f9, InitialSourceConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:19 client -> Sending packet 1 (93 bytes) for connection b00873189d11df07606c2cc221f9, Handshake 2025/04/30 10:35:19 client Long Header{Type: Handshake, DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 64, Version: v1} 2025/04/30 10:35:19 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 8, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 8, Smallest: 8}}, DelayTime: 0s} 2025/04/30 10:35:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1045 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1142 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client Dropping %!s(logging.PacketType=5) packet (1138 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:19 client -> Sending packet 0 (58 bytes) for connection b00873189d11df07606c2cc221f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:19 client Short Header{DestConnectionID: 0d0adb4e152a43006b1f8c20621c0e9615bc9234, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:19 client <- Reading packet 14 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:19 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 67389832d6d671e7b2d218a3ca300c81c29a4cfd, StatelessResetToken: 0xecd4353ca2db9b63f1cc60e29d6a8aec} 2025/04/30 10:35:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d3b124ecb591d3a4b647774ce89e22fb8f909e66, StatelessResetToken: 0xb5e2e8a3616b5782d574571f628e39b9} 2025/04/30 10:35:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ea8e7dffe5eb12ce43e477e4cf932badfd8d642, StatelessResetToken: 0x9818ed85e811bcf5b01e5d5b5779bb82} 2025/04/30 10:35:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:19 client Dropping Handshake keys. 2025/04/30 10:35:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:19 client -> Sending packet 1 (46 bytes) for connection b00873189d11df07606c2cc221f9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:19 client Short Header{DestConnectionID: 67389832d6d671e7b2d218a3ca300c81c29a4cfd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:19 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 87.914µs} 2025/04/30 10:35:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:19 client <- Reading packet 15 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:19 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 88µs} 2025/04/30 10:35:19 client newly acked packets (1): [1] 2025/04/30 10:35:19 client updated RTT: 33.433ms (σ: 10.26ms) 2025/04/30 10:35:19 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:19 client lost packet 0 (time threshold) 2025/04/30 10:35:19 client Canceling loss detection timer. 2025/04/30 10:35:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: e90e2c288d3723ac1b1894cc11204cbdb81392a7, StatelessResetToken: 0x4920fe81efe486da27194956a8f943f1} 2025/04/30 10:35:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:19 client Ignoring all packets below 15. 2025/04/30 10:35:19 client -> Sending packet 2 (63 bytes) for connection b00873189d11df07606c2cc221f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:19 client Short Header{DestConnectionID: 67389832d6d671e7b2d218a3ca300c81c29a4cfd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:19 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 119.974µs} 2025/04/30 10:35:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:19 client <- Reading packet 16 (1052 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:19 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 168µs} 2025/04/30 10:35:19 client newly acked packets (1): [2] 2025/04/30 10:35:19 client updated RTT: 33.195ms (σ: 8.169ms) 2025/04/30 10:35:19 client Canceling loss detection timer. 2025/04/30 10:35:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:19 client Ignoring all packets below 16. 2025/04/30 10:35:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:19 client -> Sending packet 3 (42 bytes) for connection b00873189d11df07606c2cc221f9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:19 client Short Header{DestConnectionID: 67389832d6d671e7b2d218a3ca300c81c29a4cfd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:19 client Connection b00873189d11df07606c2cc221f9 closed. 2025/04/30 10:35:19 Requesting https://server4:443/kkhwwdhrzp. 2025/04/30 10:35:19 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:19 Increased send buffer size to 14336 kiB 2025/04/30 10:35:19 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:19 Created qlog file: /logs/qlog/321bf2fb29c0ab1b9bb0053d4c2d7d.sqlog 2025/04/30 10:35:19 client Starting new connection to server4 ([::]:46876 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 321bf2fb29c0ab1b9bb0053d4c2d7d, version v1 2025/04/30 10:35:19 Adding connection ID (empty). 2025/04/30 10:35:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:19 client -> Sending packet 0 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: 321bf2fb29c0ab1b9bb0053d4c2d7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:35:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:19 client -> Sending packet 1 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: 321bf2fb29c0ab1b9bb0053d4c2d7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:35:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:19 client -> Sending packet 2 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: 321bf2fb29c0ab1b9bb0053d4c2d7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 10:35:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:19 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:19 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:19 client Received first packet. Switching destination connection ID to: 1e2984d744d2aa01ee213abb55bdbcafc1586500 2025/04/30 10:35:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:35:19 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:19 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:19 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 10:35:19 client newly acked packets (1): [2] 2025/04/30 10:35:19 client updated RTT: 33.956434ms (σ: 16.978217ms) 2025/04/30 10:35:19 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:20 client -> Sending packet 3 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:20 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:20 client -> &wire.PingFrame{} 2025/04/30 10:35:20 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:20 client <- Reading packet 4 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:20 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:35:20 client newly acked packets (1): [3] 2025/04/30 10:35:20 client updated RTT: 33.84ms (σ: 12.964ms) 2025/04/30 10:35:20 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:20 client -> Sending packet 4 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:20 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:20 client -> &wire.PingFrame{} 2025/04/30 10:35:20 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:35:20 client <- Reading packet 5 (149 bytes) for connection (empty), Initial 2025/04/30 10:35:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:35:20 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 560.816ms} 2025/04/30 10:35:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:20 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:35:20 client -> Sending packet 5 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:20 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:20 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:35:20 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:20 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:20 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:35:21 client -> Sending packet 6 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:21 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:21 client -> &wire.PingFrame{} 2025/04/30 10:35:21 client -> Sending packet 7 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:21 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:21 client -> &wire.PingFrame{} 2025/04/30 10:35:21 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:21 client <- Reading packet 6 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:21 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 10:35:21 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:21 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/04/30 10:35:22 client -> Sending packet 8 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:22 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:22 client -> &wire.PingFrame{} 2025/04/30 10:35:22 client -> Sending packet 9 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:22 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:22 client -> &wire.PingFrame{} 2025/04/30 10:35:22 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:35:22 client <- Reading packet 9 (56 bytes) for connection (empty), Initial 2025/04/30 10:35:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:35:22 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 64µs} 2025/04/30 10:35:22 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:35:23 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:24 client Parsed a coalesced packet. Part 1: 153 bytes. Remaining: 1047 bytes. 2025/04/30 10:35:24 client <- Reading packet 10 (153 bytes) for connection (empty), Initial 2025/04/30 10:35:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 10:35:24 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 2.124112s} 2025/04/30 10:35:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:24 client Queueing packet (1047 bytes) for later decryption 2025/04/30 10:35:24 client -> Sending packet 10 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:24 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:24 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:24 client Parsed a coalesced packet. Part 1: 60 bytes. Remaining: 1140 bytes. 2025/04/30 10:35:24 client <- Reading packet 11 (60 bytes) for connection (empty), Initial 2025/04/30 10:35:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 30, Version: v1} 2025/04/30 10:35:24 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 2.124344s} 2025/04/30 10:35:24 client <- &wire.PingFrame{} 2025/04/30 10:35:24 client Queueing packet (1140 bytes) for later decryption 2025/04/30 10:35:24 client -> Sending packet 11 (1280 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Initial 2025/04/30 10:35:24 client Long Header{Type: Initial, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:24 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 6, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:24 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:24 client <- Reading packet 12 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, Token: (empty), PacketNumber: 12, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:24 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 144µs} 2025/04/30 10:35:24 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:24 client <- Reading packet 13 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, PacketNumber: 13, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 321bf2fb29c0ab1b9bb0053d4c2d7d, InitialSourceConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:24 client -> Sending packet 0 (91 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, Handshake 2025/04/30 10:35:24 client Long Header{Type: Handshake, DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:24 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 13, DelayTime: 0s} 2025/04/30 10:35:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:24 client Dropping Initial keys. 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1047 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1140 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:24 client -> Sending packet 0 (58 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:24 client Short Header{DestConnectionID: 1e2984d744d2aa01ee213abb55bdbcafc1586500, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:24 client <- Reading packet 14 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:24 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 357ac6667121e254f4101e348c591f6bbefeaa4a, StatelessResetToken: 0x9f83ef64917b53018d871a0ee937e2ad} 2025/04/30 10:35:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a20fb974fd6b90d3154747d62c7cffcb5d6a6ec0, StatelessResetToken: 0x867622d9dcd669cff50704dfd0e6f12d} 2025/04/30 10:35:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ddad12e4af14f6c12bacf7b30ba222fe0557cd4c, StatelessResetToken: 0xae07eb8b6f777e5800cfe5f6fc1499cb} 2025/04/30 10:35:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:24 client Dropping Handshake keys. 2025/04/30 10:35:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:24 client -> Sending packet 1 (46 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:24 client Short Header{DestConnectionID: 357ac6667121e254f4101e348c591f6bbefeaa4a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:24 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 82.725µs} 2025/04/30 10:35:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:24 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:24 client -> Sending packet 3 (58 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:24 client Short Header{DestConnectionID: 357ac6667121e254f4101e348c591f6bbefeaa4a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:24 client Skipping packet number 2 2025/04/30 10:35:24 client -> Sending packet 4 (41 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:24 client Short Header{DestConnectionID: 357ac6667121e254f4101e348c591f6bbefeaa4a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:24 client <- Reading packet 16 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:24 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:24 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 120µs} 2025/04/30 10:35:24 client newly acked packets (1): [3] 2025/04/30 10:35:24 client updated RTT: 33.577ms (σ: 10.248ms) 2025/04/30 10:35:24 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:24 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:24 client -> Sending packet 5 (46 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:24 client Short Header{DestConnectionID: 357ac6667121e254f4101e348c591f6bbefeaa4a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:24 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 14, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}}, DelayTime: 104.866µs} 2025/04/30 10:35:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:24 client -> Sending packet 6 (42 bytes) for connection 321bf2fb29c0ab1b9bb0053d4c2d7d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:24 client Short Header{DestConnectionID: 357ac6667121e254f4101e348c591f6bbefeaa4a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:24 client Connection 321bf2fb29c0ab1b9bb0053d4c2d7d closed. 2025/04/30 10:35:24 Requesting https://server4:443/xhweknoljw. 2025/04/30 10:35:24 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:24 Increased send buffer size to 14336 kiB 2025/04/30 10:35:24 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:24 Created qlog file: /logs/qlog/d8e417a80bdb55ab2f9813ce11.sqlog 2025/04/30 10:35:24 client Starting new connection to server4 ([::]:40991 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8e417a80bdb55ab2f9813ce11, version v1 2025/04/30 10:35:24 Adding connection ID (empty). 2025/04/30 10:35:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:24 client -> Sending packet 0 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:24 client Long Header{Type: Initial, DestConnectionID: d8e417a80bdb55ab2f9813ce11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:35:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:25 client -> Sending packet 1 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: d8e417a80bdb55ab2f9813ce11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:35:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:25 client -> Sending packet 2 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: d8e417a80bdb55ab2f9813ce11, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:35:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:25 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:25 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:25 client Received first packet. Switching destination connection ID to: ea3f9105c8aee9a6cce48a10841641764d9d5226 2025/04/30 10:35:25 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/04/30 10:35:25 client newly acked packets (1): [2] 2025/04/30 10:35:25 client updated RTT: 33.752421ms (σ: 16.87621ms) 2025/04/30 10:35:25 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:25 client -> Sending packet 3 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:25 client -> &wire.PingFrame{} 2025/04/30 10:35:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:35:25 client -> Sending packet 4 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:25 client -> &wire.PingFrame{} 2025/04/30 10:35:25 client -> Sending packet 5 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:25 client -> &wire.PingFrame{} 2025/04/30 10:35:25 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:25 client <- Reading packet 4 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:25 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs} 2025/04/30 10:35:25 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:25 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:25 client <- Reading packet 6 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 156.032ms} 2025/04/30 10:35:25 client newly acked packets (1): [5] 2025/04/30 10:35:25 client updated RTT: 53.257ms (σ: 51.667ms) 2025/04/30 10:35:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:25 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:25 client -> Sending packet 6 (1280 bytes) for connection d8e417a80bdb55ab2f9813ce11, Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:25 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:25 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:25 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:25 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:25 client <- Reading packet 7 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:25 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 104µs} 2025/04/30 10:35:25 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:26 client <- Reading packet 11 (750 bytes) for connection (empty), Handshake 2025/04/30 10:35:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 11, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:35:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:35:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8e417a80bdb55ab2f9813ce11, InitialSourceConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:26 client <- Reading packet 12 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 12, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:26 client <- &wire.PingFrame{} 2025/04/30 10:35:26 client -> Sending packet 0 (91 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:26 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:26 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 0s} 2025/04/30 10:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:26 client Dropping Initial keys. 2025/04/30 10:35:26 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:26 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:26 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:26 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:26 client -> Sending packet 0 (58 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:26 client Short Header{DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:26 client -> Sending packet 1 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:26 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:26 client -> Sending packet 2 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:26 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:26 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:27 client -> Sending packet 3 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:27 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:27 client -> Sending packet 4 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:27 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:27 client <- Reading packet 14 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 14, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:27 client <- &wire.PingFrame{} 2025/04/30 10:35:27 client -> Sending packet 5 (54 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:27 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 10:35:27 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 11, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 11}}, DelayTime: 0s} 2025/04/30 10:35:28 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:35:28 client -> Sending packet 6 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:28 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:28 client -> Sending packet 7 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:28 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:28 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:29 client <- Reading packet 16 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:29 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:29 client <- &wire.PingFrame{} 2025/04/30 10:35:29 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:29 client -> Sending packet 1 (44 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:29 client Short Header{DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:29 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 16, DelayTime: 113.202µs} 2025/04/30 10:35:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 10:35:30 client -> Sending packet 8 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:30 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:30 client -> Sending packet 9 (86 bytes) for connection d8e417a80bdb55ab2f9813ce11, Handshake 2025/04/30 10:35:30 client Long Header{Type: Handshake, DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:30 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:32 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:33 client <- Reading packet 18 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:33 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:33 client <- &wire.PingFrame{} 2025/04/30 10:35:33 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:33 client -> Sending packet 2 (46 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:33 client Short Header{DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 16, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}}, DelayTime: 134.631µs} 2025/04/30 10:35:33 client <- Reading packet 21 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:33 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 111.48ms} 2025/04/30 10:35:33 client Peer doesn't await address validation any longer. 2025/04/30 10:35:33 client <- &wire.PingFrame{} 2025/04/30 10:35:33 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:33 client -> Sending packet 3 (48 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:33 client Short Header{DestConnectionID: ea3f9105c8aee9a6cce48a10841641764d9d5226, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 16, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}}, DelayTime: 103.583µs} 2025/04/30 10:35:33 client <- Reading packet 22 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:33 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cd8e1d4b49cbda5f293dd1426efa1fe553944657, StatelessResetToken: 0x36416663115160466a8a3121a99c3665} 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1d85d981cf89c705fc35a6c7bfc3d6cda921106, StatelessResetToken: 0x1c6a5940e782cc5dfff1c89e5d0e0ed5} 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 266ede99bfa48bfc62e429d612d836a0368d0d90, StatelessResetToken: 0x8624467a8cfce19ed72b8519d93c2f06} 2025/04/30 10:35:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:33 client Dropping Handshake keys. 2025/04/30 10:35:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:33 client -> Sending packet 5 (69 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:33 client Short Header{DestConnectionID: cd8e1d4b49cbda5f293dd1426efa1fe553944657, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 16, AckRanges: {{Largest: 22, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}}, DelayTime: 119.292µs} 2025/04/30 10:35:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:33 client -> Sending packet 6 (60 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:33 client Short Header{DestConnectionID: cd8e1d4b49cbda5f293dd1426efa1fe553944657, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:33 client <- Reading packet 24 (1095 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:33 client Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:33 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 123.432ms} 2025/04/30 10:35:33 client newly acked packets (1): [6] 2025/04/30 10:35:33 client updated RTT: 62.904ms (σ: 58.044ms) 2025/04/30 10:35:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:33 client Canceling loss detection timer. 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 68d0cac5838dc1af167143787fb3d304c11c0937, StatelessResetToken: 0x9602a641e8659593c6e5b268f0bf4604} 2025/04/30 10:35:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:33 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:33 client -> Sending packet 7 (50 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:33 client Short Header{DestConnectionID: cd8e1d4b49cbda5f293dd1426efa1fe553944657, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 24, LowestAcked: 16, AckRanges: {{Largest: 24, Smallest: 24}, {Largest: 22, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}}, DelayTime: 156.171µs} 2025/04/30 10:35:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:33 client -> Sending packet 8 (42 bytes) for connection d8e417a80bdb55ab2f9813ce11, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:33 client Short Header{DestConnectionID: cd8e1d4b49cbda5f293dd1426efa1fe553944657, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:33 client Connection d8e417a80bdb55ab2f9813ce11 closed. 2025/04/30 10:35:33 Requesting https://server4:443/qfbrlgjbvf. 2025/04/30 10:35:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:33 Increased send buffer size to 14336 kiB 2025/04/30 10:35:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:33 Created qlog file: /logs/qlog/ccdaf41de25c0e5de512.sqlog 2025/04/30 10:35:33 client Starting new connection to server4 ([::]:45774 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ccdaf41de25c0e5de512, version v1 2025/04/30 10:35:33 Adding connection ID (empty). 2025/04/30 10:35:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:33 client -> Sending packet 0 (1280 bytes) for connection ccdaf41de25c0e5de512, Initial 2025/04/30 10:35:33 client Long Header{Type: Initial, DestConnectionID: ccdaf41de25c0e5de512, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:33 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:33 client Received first packet. Switching destination connection ID to: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6 2025/04/30 10:35:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 10:35:33 client newly acked packets (1): [0] 2025/04/30 10:35:33 client updated RTT: 32.999509ms (σ: 16.499754ms) 2025/04/30 10:35:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 306 bytes. 2025/04/30 10:35:33 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, PacketNumber: 1, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:35:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:35:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ccdaf41de25c0e5de512, InitialSourceConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:33 client Dropping %!s(logging.PacketType=5) packet (306 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ccdaf41de25c0e5de512 2025/04/30 10:35:33 client Long Header{Type: Initial, DestConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:33 client Dropping Initial keys. 2025/04/30 10:35:33 client -> Sending packet 1 (52 bytes) for connection ccdaf41de25c0e5de512, Handshake 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:33 client -> Sending packet 0 (58 bytes) for connection ccdaf41de25c0e5de512, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:33 client Short Header{DestConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:33 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:33 client -> Sending packet 2 (86 bytes) for connection ccdaf41de25c0e5de512, Handshake 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:33 client -> Sending packet 3 (86 bytes) for connection ccdaf41de25c0e5de512, Handshake 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: c6a9c4593173fbf47cdb2a2b72e45d483ea5b1d6, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:33 client <- Reading packet 3 (1174 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:33 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.584ms} 2025/04/30 10:35:33 client Peer doesn't await address validation any longer. 2025/04/30 10:35:33 client newly acked packets (1): [0] 2025/04/30 10:35:33 client updated RTT: 45.923ms (σ: 38.222ms) 2025/04/30 10:35:33 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:33 client Canceling loss detection timer. 2025/04/30 10:35:33 client Dropping Handshake keys. 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e83497696e93b01245193793f85b92b08c91112, StatelessResetToken: 0x613d012f1cbe448340e8f61a2829e2ef} 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1794f11ec2ea8d4b8a795e8583674b6b9f0c3f6, StatelessResetToken: 0xa64d5db8435d7f9bb99953f36193ff8a} 2025/04/30 10:35:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 36e0e8ddc58018490204febe8fb502cfeeef6610, StatelessResetToken: 0x12f8e72173f44542fad7481d34eeddf8} 2025/04/30 10:35:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:33 client -> Sending packet 1 (46 bytes) for connection ccdaf41de25c0e5de512, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:33 client Short Header{DestConnectionID: 7e83497696e93b01245193793f85b92b08c91112, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 166.14µs} 2025/04/30 10:35:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:33 client -> Sending packet 2 (42 bytes) for connection ccdaf41de25c0e5de512, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:33 client Short Header{DestConnectionID: 7e83497696e93b01245193793f85b92b08c91112, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:33 client Connection ccdaf41de25c0e5de512 closed. 2025/04/30 10:35:33 Requesting https://server4:443/aokeijlpbi. 2025/04/30 10:35:33 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:33 Increased send buffer size to 14336 kiB 2025/04/30 10:35:33 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:33 Created qlog file: /logs/qlog/fee27023e87017cd8257fb634f.sqlog 2025/04/30 10:35:33 client Starting new connection to server4 ([::]:59564 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fee27023e87017cd8257fb634f, version v1 2025/04/30 10:35:33 Adding connection ID (empty). 2025/04/30 10:35:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:33 client -> Sending packet 0 (1280 bytes) for connection fee27023e87017cd8257fb634f, Initial 2025/04/30 10:35:33 client Long Header{Type: Initial, DestConnectionID: fee27023e87017cd8257fb634f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:35:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:35:33 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:33 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:33 client Received first packet. Switching destination connection ID to: cddf2401dd2769d2fea2cdfd56954cee1261c0a6 2025/04/30 10:35:33 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 10:35:33 client newly acked packets (1): [0] 2025/04/30 10:35:33 client updated RTT: 33.146331ms (σ: 16.573165ms) 2025/04/30 10:35:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 303 bytes. 2025/04/30 10:35:33 client <- Reading packet 1 (751 bytes) for connection (empty), Handshake 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:35:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:35:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fee27023e87017cd8257fb634f, InitialSourceConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:33 client Dropping %!s(logging.PacketType=5) packet (303 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fee27023e87017cd8257fb634f 2025/04/30 10:35:33 client Long Header{Type: Initial, DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:33 client Dropping Initial keys. 2025/04/30 10:35:33 client -> Sending packet 1 (52 bytes) for connection fee27023e87017cd8257fb634f, Handshake 2025/04/30 10:35:33 client Long Header{Type: Handshake, DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:33 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:33 client -> Sending packet 0 (58 bytes) for connection fee27023e87017cd8257fb634f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:33 client Short Header{DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:34 client -> Sending packet 2 (86 bytes) for connection fee27023e87017cd8257fb634f, Handshake 2025/04/30 10:35:34 client Long Header{Type: Handshake, DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:34 client -> Sending packet 3 (86 bytes) for connection fee27023e87017cd8257fb634f, Handshake 2025/04/30 10:35:34 client Long Header{Type: Handshake, DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:34 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:34 client <- &wire.PingFrame{} 2025/04/30 10:35:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:34 client -> Sending packet 1 (44 bytes) for connection fee27023e87017cd8257fb634f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:34 client Short Header{DestConnectionID: cddf2401dd2769d2fea2cdfd56954cee1261c0a6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 91.521µs} 2025/04/30 10:35:34 client <- Reading packet 4 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d4d5dc5f9a9a89f4cd727f1f2a6e4b83c93a22d, StatelessResetToken: 0xb80ccb978ea6aaa5875e7f16ec786319} 2025/04/30 10:35:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a08ca9d5c21c94a35fb295f7b0840efa882dabe1, StatelessResetToken: 0x4b20bd90b15b1222ec4f657483abe508} 2025/04/30 10:35:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 112673f920259970b45f25e90e196412735d81c0, StatelessResetToken: 0xf11a412a9ad6ef3776dda6ae5404ed98} 2025/04/30 10:35:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:34 client Dropping Handshake keys. 2025/04/30 10:35:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:34 client -> Sending packet 3 (65 bytes) for connection fee27023e87017cd8257fb634f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:34 client Short Header{DestConnectionID: 8d4d5dc5f9a9a89f4cd727f1f2a6e4b83c93a22d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 108.772µs} 2025/04/30 10:35:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:34 client -> Sending packet 4 (60 bytes) for connection fee27023e87017cd8257fb634f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:34 client Short Header{DestConnectionID: 8d4d5dc5f9a9a89f4cd727f1f2a6e4b83c93a22d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:34 client <- Reading packet 5 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:34 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:34 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 144µs} 2025/04/30 10:35:34 client newly acked packets (1): [4] 2025/04/30 10:35:34 client updated RTT: 32.969ms (σ: 12.783ms) 2025/04/30 10:35:34 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:34 client Canceling loss detection timer. 2025/04/30 10:35:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 508b09a75ef1588094a6d00aec252f160796e017, StatelessResetToken: 0xed005790c00384e5b0ca5c2ff3567ab6} 2025/04/30 10:35:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:34 client -> Sending packet 5 (42 bytes) for connection fee27023e87017cd8257fb634f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:34 client Short Header{DestConnectionID: 8d4d5dc5f9a9a89f4cd727f1f2a6e4b83c93a22d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:34 client Connection fee27023e87017cd8257fb634f closed. 2025/04/30 10:35:34 Requesting https://server4:443/ynbgqqrdvk. 2025/04/30 10:35:34 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:34 Increased send buffer size to 14336 kiB 2025/04/30 10:35:34 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:34 Created qlog file: /logs/qlog/bc2e0e36050a5ac669.sqlog 2025/04/30 10:35:34 client Starting new connection to server4 ([::]:49946 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bc2e0e36050a5ac669, version v1 2025/04/30 10:35:34 Adding connection ID (empty). 2025/04/30 10:35:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:34 client -> Sending packet 0 (1280 bytes) for connection bc2e0e36050a5ac669, Initial 2025/04/30 10:35:34 client Long Header{Type: Initial, DestConnectionID: bc2e0e36050a5ac669, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:34 client -> Sending packet 1 (1280 bytes) for connection bc2e0e36050a5ac669, Initial 2025/04/30 10:35:34 client Long Header{Type: Initial, DestConnectionID: bc2e0e36050a5ac669, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:34 client -> Sending packet 2 (1280 bytes) for connection bc2e0e36050a5ac669, Initial 2025/04/30 10:35:34 client Long Header{Type: Initial, DestConnectionID: bc2e0e36050a5ac669, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:34 client -> Sending packet 3 (1280 bytes) for connection bc2e0e36050a5ac669, Initial 2025/04/30 10:35:34 client Long Header{Type: Initial, DestConnectionID: bc2e0e36050a5ac669, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:34 client -> Sending packet 4 (1280 bytes) for connection bc2e0e36050a5ac669, Initial 2025/04/30 10:35:34 client Long Header{Type: Initial, DestConnectionID: bc2e0e36050a5ac669, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:34 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:34 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:34 client Received first packet. Switching destination connection ID to: 80cece3e657cabafd12ddbcd72c3bec4972484e9 2025/04/30 10:35:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs} 2025/04/30 10:35:34 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:35 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:35 client <- Reading packet 4 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 397.744ms} 2025/04/30 10:35:35 client newly acked packets (1): [4] 2025/04/30 10:35:35 client updated RTT: 431.687506ms (σ: 215.843753ms) 2025/04/30 10:35:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:35 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:35 client -> Sending packet 5 (1280 bytes) for connection bc2e0e36050a5ac669, Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:35 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:35 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:35 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:35 client <- Reading packet 5 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:35 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 112µs} 2025/04/30 10:35:35 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:35 client <- Reading packet 6 (746 bytes) for connection (empty), Handshake 2025/04/30 10:35:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, PacketNumber: 6, PacketNumberLen: 1, Length: 717, Version: v1} 2025/04/30 10:35:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:35:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bc2e0e36050a5ac669, InitialSourceConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:35 client -> Sending packet 0 (91 bytes) for connection bc2e0e36050a5ac669, Handshake 2025/04/30 10:35:35 client Long Header{Type: Handshake, DestConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:35 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/04/30 10:35:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:35 client Dropping Initial keys. 2025/04/30 10:35:35 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:35 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:35 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:35 client -> Sending packet 0 (58 bytes) for connection bc2e0e36050a5ac669, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:35 client Short Header{DestConnectionID: 80cece3e657cabafd12ddbcd72c3bec4972484e9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:35 client <- Reading packet 8 (1176 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:35 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 146.536ms} 2025/04/30 10:35:35 client Peer doesn't await address validation any longer. 2025/04/30 10:35:35 client newly acked packets (1): [0] 2025/04/30 10:35:35 client updated RTT: 400.048ms (σ: 225.159ms) 2025/04/30 10:35:35 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:35 client Canceling loss detection timer. 2025/04/30 10:35:35 client Dropping Handshake keys. 2025/04/30 10:35:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4ade3ff2e9deab75deae030101159bac9847f4e8, StatelessResetToken: 0x7ce83178384c4d2ff530cb254cd2db2e} 2025/04/30 10:35:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: db1cf085e178353ae7ae1b9d8ed9b8503ef76af6, StatelessResetToken: 0xc7e01989b2a66cfa1f74310e16e4399a} 2025/04/30 10:35:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb7e8c745532831ce22cb0fb2c5f1fc4da597555, StatelessResetToken: 0xeadc7a5f740d7a431100ee7c8e148693} 2025/04/30 10:35:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:35 client -> Sending packet 1 (46 bytes) for connection bc2e0e36050a5ac669, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:35 client Short Header{DestConnectionID: 4ade3ff2e9deab75deae030101159bac9847f4e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:35 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 210.973µs} 2025/04/30 10:35:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:35 client -> Sending packet 2 (42 bytes) for connection bc2e0e36050a5ac669, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:35 client Short Header{DestConnectionID: 4ade3ff2e9deab75deae030101159bac9847f4e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:35 client Connection bc2e0e36050a5ac669 closed. 2025/04/30 10:35:35 Requesting https://server4:443/zdrckewuzp. 2025/04/30 10:35:35 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:35 Increased send buffer size to 14336 kiB 2025/04/30 10:35:35 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:35 Created qlog file: /logs/qlog/72fb4f01b6347ac3c4.sqlog 2025/04/30 10:35:35 client Starting new connection to server4 ([::]:50810 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 72fb4f01b6347ac3c4, version v1 2025/04/30 10:35:35 Adding connection ID (empty). 2025/04/30 10:35:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:35 client -> Sending packet 0 (1280 bytes) for connection 72fb4f01b6347ac3c4, Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: 72fb4f01b6347ac3c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:35:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:35 client -> Sending packet 1 (1280 bytes) for connection 72fb4f01b6347ac3c4, Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: 72fb4f01b6347ac3c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:35:35 client -> Sending packet 2 (1280 bytes) for connection 72fb4f01b6347ac3c4, Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: 72fb4f01b6347ac3c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:35:35 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:35 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:35 client Received first packet. Switching destination connection ID to: 1cb6eb71d908ad434062b9de893386b29f8885d1 2025/04/30 10:35:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:35 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:36 client -> Sending packet 3 (1280 bytes) for connection 72fb4f01b6347ac3c4, Initial 2025/04/30 10:35:36 client Long Header{Type: Initial, DestConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:35:36 client -> Sending packet 4 (1280 bytes) for connection 72fb4f01b6347ac3c4, Initial 2025/04/30 10:35:36 client Long Header{Type: Initial, DestConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 10:35:36 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:36 client <- Reading packet 3 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 10:35:36 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:36 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:36 client <- Reading packet 5 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:36 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 398.728ms} 2025/04/30 10:35:36 client newly acked packets (1): [4] 2025/04/30 10:35:36 client updated RTT: 432.701256ms (σ: 216.350628ms) 2025/04/30 10:35:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:36 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:36 client -> Sending packet 5 (1280 bytes) for connection 72fb4f01b6347ac3c4, Initial 2025/04/30 10:35:36 client Long Header{Type: Initial, DestConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:36 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:36 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:36 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:36 client <- Reading packet 7 (748 bytes) for connection (empty), Handshake 2025/04/30 10:35:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, PacketNumber: 7, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:35:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:35:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 72fb4f01b6347ac3c4, InitialSourceConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:36 client -> Sending packet 0 (91 bytes) for connection 72fb4f01b6347ac3c4, Handshake 2025/04/30 10:35:36 client Long Header{Type: Handshake, DestConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:36 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:35:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:36 client Dropping Initial keys. 2025/04/30 10:35:36 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:36 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:36 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:36 client -> Sending packet 0 (58 bytes) for connection 72fb4f01b6347ac3c4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:36 client Short Header{DestConnectionID: 1cb6eb71d908ad434062b9de893386b29f8885d1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:37 client <- Reading packet 10 (1296 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 439.312ms} 2025/04/30 10:35:37 client Peer doesn't await address validation any longer. 2025/04/30 10:35:37 client newly acked packets (1): [0] 2025/04/30 10:35:37 client updated RTT: 434.429ms (σ: 165.719ms) 2025/04/30 10:35:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:37 client Canceling loss detection timer. 2025/04/30 10:35:37 client Dropping Handshake keys. 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7bfe4dfd4b9f0a866a2b3d4a1338096250843e8e, StatelessResetToken: 0x5371fea930e5d666c6c4b8e890196db4} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1a221083914101ec47744716f42519cd657903bd, StatelessResetToken: 0xf6b95e9a972a26ff7e0b72427b865c43} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 590b3781a3c59aa60ff70e1899feb8e578565a0f, StatelessResetToken: 0xecf872cebfaebacb8f86db5735e7ba2a} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7bfe4dfd4b9f0a866a2b3d4a1338096250843e8e, StatelessResetToken: 0x5371fea930e5d666c6c4b8e890196db4} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1a221083914101ec47744716f42519cd657903bd, StatelessResetToken: 0xf6b95e9a972a26ff7e0b72427b865c43} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 590b3781a3c59aa60ff70e1899feb8e578565a0f, StatelessResetToken: 0xecf872cebfaebacb8f86db5735e7ba2a} 2025/04/30 10:35:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:37 client <- Reading packet 11 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 439.56ms} 2025/04/30 10:35:37 client <- &wire.PingFrame{} 2025/04/30 10:35:37 client -> Sending packet 1 (46 bytes) for connection 72fb4f01b6347ac3c4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 7bfe4dfd4b9f0a866a2b3d4a1338096250843e8e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 10, DelayTime: 279.902µs} 2025/04/30 10:35:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:37 client -> Sending packet 2 (42 bytes) for connection 72fb4f01b6347ac3c4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 7bfe4dfd4b9f0a866a2b3d4a1338096250843e8e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:37 client Connection 72fb4f01b6347ac3c4 closed. 2025/04/30 10:35:37 Requesting https://server4:443/jigoehvqnz. 2025/04/30 10:35:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:37 Increased send buffer size to 14336 kiB 2025/04/30 10:35:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:37 Created qlog file: /logs/qlog/4e17f6b040e7db8f65ed.sqlog 2025/04/30 10:35:37 client Starting new connection to server4 ([::]:60173 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4e17f6b040e7db8f65ed, version v1 2025/04/30 10:35:37 Adding connection ID (empty). 2025/04/30 10:35:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:37 client -> Sending packet 0 (1280 bytes) for connection 4e17f6b040e7db8f65ed, Initial 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: 4e17f6b040e7db8f65ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:35:37 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:37 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:37 client Received first packet. Switching destination connection ID to: eb4afef4eeaf1512a90169e8da0d35590969d4d7 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 10:35:37 client newly acked packets (1): [0] 2025/04/30 10:35:37 client updated RTT: 33.10081ms (σ: 16.550405ms) 2025/04/30 10:35:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:37 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 306 bytes. 2025/04/30 10:35:37 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:35:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, PacketNumber: 1, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:35:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:35:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4e17f6b040e7db8f65ed, InitialSourceConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:37 client Dropping %!s(logging.PacketType=5) packet (306 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4e17f6b040e7db8f65ed 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:37 client Long Header{Type: Handshake, DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:37 client Dropping Initial keys. 2025/04/30 10:35:37 client -> Sending packet 1 (110 bytes) for connection 4e17f6b040e7db8f65ed, Handshake 2025/04/30 10:35:37 client Long Header{Type: Handshake, DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:37 client Short Header{DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:37 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:37 client -> Sending packet 2 (86 bytes) for connection 4e17f6b040e7db8f65ed, Handshake 2025/04/30 10:35:37 client Long Header{Type: Handshake, DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:37 client -> Sending packet 3 (86 bytes) for connection 4e17f6b040e7db8f65ed, Handshake 2025/04/30 10:35:37 client Long Header{Type: Handshake, DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:37 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.PingFrame{} 2025/04/30 10:35:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:37 client -> Sending packet 1 (44 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: eb4afef4eeaf1512a90169e8da0d35590969d4d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 88.234µs} 2025/04/30 10:35:37 client <- Reading packet 4 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, StatelessResetToken: 0xcb0f38914f5e726177e8ad5bbe75ab39} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4909b4a7ac5f423908eea78139234bf6aa7eb9d7, StatelessResetToken: 0x5ba1a60843dc4b20e14638d8f1867b31} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d8f787340731b1cb61c53e44ce7bf2bcfab401f9, StatelessResetToken: 0x6affb68971247bca07b11ad4cfd264aa} 2025/04/30 10:35:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:37 client Dropping Handshake keys. 2025/04/30 10:35:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:37 client -> Sending packet 3 (65 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 95.838µs} 2025/04/30 10:35:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:37 client -> Sending packet 4 (60 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:37 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 111.568ms} 2025/04/30 10:35:37 client <- &wire.PingFrame{} 2025/04/30 10:35:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:37 client Sending ACK because the ACK timer expired. 2025/04/30 10:35:37 client -> Sending packet 5 (45 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 25.375472ms} 2025/04/30 10:35:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:37 client -> Sending packet 7 (60 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:37 client -> Sending packet 8 (60 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:37 client -> Sending packet 9 (1315 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.PingFrame{} 2025/04/30 10:35:37 client <- Reading packet 6 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 128µs} 2025/04/30 10:35:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f8e5cf9c240cb505c18f3ac66cb26b640db25691, StatelessResetToken: 0x76b6259fffb43f514238f0a5ec3b692a} 2025/04/30 10:35:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:37 client <- Reading packet 7 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:37 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 40µs} 2025/04/30 10:35:37 client newly acked packets (1): [9] 2025/04/30 10:35:37 client updated RTT: 32.957ms (σ: 12.697ms) 2025/04/30 10:35:37 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:37 client setting loss timer for packet 8 (1-RTT) to 37.076625ms (in 2025-04-30 10:35:37.603762482 +0000 UTC m=+50.614450979) 2025/04/30 10:35:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:37 client -> Sending packet 10 (42 bytes) for connection 4e17f6b040e7db8f65ed, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:37 client Short Header{DestConnectionID: 3b8e643e345106d71dff8e0d8c0f7fb16763019a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:37 client Connection 4e17f6b040e7db8f65ed closed. 2025/04/30 10:35:37 Requesting https://server4:443/tgoiydoaxi. 2025/04/30 10:35:37 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:37 Increased send buffer size to 14336 kiB 2025/04/30 10:35:37 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:37 Created qlog file: /logs/qlog/557d62d477bebd9bb46b95303260f281.sqlog 2025/04/30 10:35:37 client Starting new connection to server4 ([::]:48484 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 557d62d477bebd9bb46b95303260f281, version v1 2025/04/30 10:35:37 Adding connection ID (empty). 2025/04/30 10:35:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:37 client -> Sending packet 0 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: 557d62d477bebd9bb46b95303260f281, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:37 client -> Sending packet 1 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: 557d62d477bebd9bb46b95303260f281, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:37 client -> Sending packet 2 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: 557d62d477bebd9bb46b95303260f281, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 10:35:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 10:35:37 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:37 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:37 client Received first packet. Switching destination connection ID to: 936c3d0aa445611107a879ab24b9ce739544cd80 2025/04/30 10:35:37 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 80µs} 2025/04/30 10:35:37 client newly acked packets (1): [2] 2025/04/30 10:35:37 client updated RTT: 34.412443ms (σ: 17.206221ms) 2025/04/30 10:35:37 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:38 client -> Sending packet 3 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:38 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:38 client -> &wire.PingFrame{} 2025/04/30 10:35:38 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:38 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:38 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 112µs} 2025/04/30 10:35:38 client newly acked packets (1): [3] 2025/04/30 10:35:38 client updated RTT: 34.226ms (σ: 13.276ms) 2025/04/30 10:35:38 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:38 client -> Sending packet 4 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:38 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:38 client -> &wire.PingFrame{} 2025/04/30 10:35:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:35:39 client -> Sending packet 5 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:39 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:39 client -> &wire.PingFrame{} 2025/04/30 10:35:39 client -> Sending packet 6 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:39 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:39 client -> &wire.PingFrame{} 2025/04/30 10:35:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:39 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:39 client Queueing packet (753 bytes) for later decryption 2025/04/30 10:35:39 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:35:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/04/30 10:35:40 client -> Sending packet 7 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:40 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:40 client -> &wire.PingFrame{} 2025/04/30 10:35:40 client -> Sending packet 8 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:40 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:40 client -> &wire.PingFrame{} 2025/04/30 10:35:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:40 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:40 client <- Reading packet 10 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:40 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 80µs} 2025/04/30 10:35:40 client newly acked packets (1): [8] 2025/04/30 10:35:40 client updated RTT: 34.204ms (σ: 10ms) 2025/04/30 10:35:40 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:41 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:42 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:42 client <- Reading packet 11 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:42 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 2.27684s} 2025/04/30 10:35:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:42 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:42 client -> Sending packet 9 (1280 bytes) for connection 557d62d477bebd9bb46b95303260f281, Initial 2025/04/30 10:35:42 client Long Header{Type: Initial, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:42 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:42 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:42 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:42 client <- Reading packet 7 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, PacketNumber: 7, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 557d62d477bebd9bb46b95303260f281, InitialSourceConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:42 client <- Reading packet 8 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, PacketNumber: 8, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:42 client <- &wire.PingFrame{} 2025/04/30 10:35:42 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:42 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:42 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:42 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:42 client -> Sending packet 0 (91 bytes) for connection 557d62d477bebd9bb46b95303260f281, Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:42 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:35:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:42 client Dropping Initial keys. 2025/04/30 10:35:42 client Parsed a coalesced packet. Part 1: 58 bytes. Remaining: 1142 bytes. 2025/04/30 10:35:42 client Dropping %!s(logging.PacketType=0) packet (58 bytes) because we already dropped the keys. 2025/04/30 10:35:42 client Dropping %!s(logging.PacketType=5) packet (1142 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:42 client -> Sending packet 0 (58 bytes) for connection 557d62d477bebd9bb46b95303260f281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:42 client Short Header{DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:42 client <- Reading packet 14 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, PacketNumber: 14, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:42 client -> Sending packet 1 (54 bytes) for connection 557d62d477bebd9bb46b95303260f281, Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 10:35:42 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 7, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 8, Smallest: 7}}, DelayTime: 0s} 2025/04/30 10:35:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:42 client -> Sending packet 2 (86 bytes) for connection 557d62d477bebd9bb46b95303260f281, Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:42 client -> Sending packet 3 (86 bytes) for connection 557d62d477bebd9bb46b95303260f281, Handshake 2025/04/30 10:35:42 client Long Header{Type: Handshake, DestConnectionID: 936c3d0aa445611107a879ab24b9ce739544cd80, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:42 client <- Reading packet 15 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:42 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0534c45e0ee2e4a5dea49cddf0906215537883ba, StatelessResetToken: 0x65cc44a33d0ee22f2c5f3f9e3684c679} 2025/04/30 10:35:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8ffe518fc58459278a18044aee95af70e5c77cf, StatelessResetToken: 0x50203cae9d9cbeb563b7aa20b7955972} 2025/04/30 10:35:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b7257a019b8aecd7da8597a2d82540021b16dde, StatelessResetToken: 0x6f41c0b5d76697233de1af74d98008d8} 2025/04/30 10:35:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:42 client Dropping Handshake keys. 2025/04/30 10:35:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:42 client -> Sending packet 2 (65 bytes) for connection 557d62d477bebd9bb46b95303260f281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:42 client Short Header{DestConnectionID: 0534c45e0ee2e4a5dea49cddf0906215537883ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:42 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 151.372µs} 2025/04/30 10:35:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:42 client -> Sending packet 3 (60 bytes) for connection 557d62d477bebd9bb46b95303260f281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:42 client Short Header{DestConnectionID: 0534c45e0ee2e4a5dea49cddf0906215537883ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:42 client <- Reading packet 16 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:42 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 192µs} 2025/04/30 10:35:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f61f8b517c775f1d4754a9cb8cbede988d8b536f, StatelessResetToken: 0x95711c309e990fb74f352ec1ac7b8dbf} 2025/04/30 10:35:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:42 client -> Sending packet 4 (42 bytes) for connection 557d62d477bebd9bb46b95303260f281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:42 client Short Header{DestConnectionID: 0534c45e0ee2e4a5dea49cddf0906215537883ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:42 client Connection 557d62d477bebd9bb46b95303260f281 closed. 2025/04/30 10:35:42 Requesting https://server4:443/herrnhvulh. 2025/04/30 10:35:42 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:42 Increased send buffer size to 14336 kiB 2025/04/30 10:35:42 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:42 Created qlog file: /logs/qlog/6ebc3555e57b76edc9bc0d44fd97d02252011f.sqlog 2025/04/30 10:35:42 client Starting new connection to server4 ([::]:54677 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6ebc3555e57b76edc9bc0d44fd97d02252011f, version v1 2025/04/30 10:35:42 Adding connection ID (empty). 2025/04/30 10:35:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:42 client -> Sending packet 0 (1280 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, Initial 2025/04/30 10:35:42 client Long Header{Type: Initial, DestConnectionID: 6ebc3555e57b76edc9bc0d44fd97d02252011f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:43 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:43 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:43 client Received first packet. Switching destination connection ID to: c0b5b7fd2fe7289a481d8934bec6280539cb7646 2025/04/30 10:35:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 10:35:43 client newly acked packets (1): [0] 2025/04/30 10:35:43 client updated RTT: 33.189053ms (σ: 16.594526ms) 2025/04/30 10:35:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 296 bytes. 2025/04/30 10:35:43 client <- Reading packet 1 (758 bytes) for connection (empty), Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, PacketNumber: 1, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:35:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:35:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6ebc3555e57b76edc9bc0d44fd97d02252011f, InitialSourceConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:43 client Dropping %!s(logging.PacketType=5) packet (296 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f 2025/04/30 10:35:43 client Long Header{Type: Initial, DestConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client Dropping Initial keys. 2025/04/30 10:35:43 client -> Sending packet 1 (52 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:43 client -> Sending packet 0 (58 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:43 client -> Sending packet 2 (86 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client -> Sending packet 3 (86 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: c0b5b7fd2fe7289a481d8934bec6280539cb7646, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, StatelessResetToken: 0xbdb15f4a3040a04b5f8db7902b8b41f2} 2025/04/30 10:35:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: de30b4a8e8756ec354ebd0a43a4446ed9a668752, StatelessResetToken: 0xedb41f8a491d7e1bc96e6249212fc4b9} 2025/04/30 10:35:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f066f4b797b6c52491bf21d894f88a98f39054b7, StatelessResetToken: 0x3e6bf7c214b7d4150cfe41807334cbde} 2025/04/30 10:35:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:43 client Dropping Handshake keys. 2025/04/30 10:35:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:43 client -> Sending packet 2 (65 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 155.239µs} 2025/04/30 10:35:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:43 client -> Sending packet 3 (60 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:43 client -> Sending packet 5 (60 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:43 client -> Sending packet 6 (60 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:43 client -> Sending packet 7 (1315 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.PingFrame{} 2025/04/30 10:35:43 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 48µs} 2025/04/30 10:35:43 client newly acked packets (1): [6] 2025/04/30 10:35:43 client updated RTT: 32.938ms (σ: 12.946ms) 2025/04/30 10:35:43 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:43 client Canceling loss detection timer. 2025/04/30 10:35:43 client <- Reading packet 6 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 96µs} 2025/04/30 10:35:43 client newly acked packets (1): [7] 2025/04/30 10:35:43 client updated RTT: 32.812ms (σ: 9.961ms) 2025/04/30 10:35:43 client <- Reading packet 7 (1135 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 86.504ms} 2025/04/30 10:35:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: c6d4ad56c0735928e188931946ddb4bef8569df4, StatelessResetToken: 0x724bf2d962c57cfb9fca61879c234f9e} 2025/04/30 10:35:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: c6d4ad56c0735928e188931946ddb4bef8569df4, StatelessResetToken: 0x724bf2d962c57cfb9fca61879c234f9e} 2025/04/30 10:35:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:43 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 86.72ms} 2025/04/30 10:35:43 client <- &wire.PingFrame{} 2025/04/30 10:35:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:35:43 client -> Sending packet 8 (46 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 181.95µs} 2025/04/30 10:35:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:43 client -> Sending packet 9 (42 bytes) for connection 6ebc3555e57b76edc9bc0d44fd97d02252011f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:43 client Short Header{DestConnectionID: 8f968be948180cfb34b5f0f13a0bc46d051bd58d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:43 client Connection 6ebc3555e57b76edc9bc0d44fd97d02252011f closed. 2025/04/30 10:35:43 Requesting https://server4:443/vovlhoamcv. 2025/04/30 10:35:43 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:43 Increased send buffer size to 14336 kiB 2025/04/30 10:35:43 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:43 Created qlog file: /logs/qlog/4a5983e12f9140644b4f6d4a566eb680041b6f.sqlog 2025/04/30 10:35:43 client Starting new connection to server4 ([::]:53162 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4a5983e12f9140644b4f6d4a566eb680041b6f, version v1 2025/04/30 10:35:43 Adding connection ID (empty). 2025/04/30 10:35:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:43 client -> Sending packet 0 (1280 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Initial 2025/04/30 10:35:43 client Long Header{Type: Initial, DestConnectionID: 4a5983e12f9140644b4f6d4a566eb680041b6f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 10:35:43 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:43 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:43 client Received first packet. Switching destination connection ID to: e91519c863d21c3b54e630363b12eb2d51302085 2025/04/30 10:35:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:35:43 client newly acked packets (1): [0] 2025/04/30 10:35:43 client updated RTT: 33.194573ms (σ: 16.597286ms) 2025/04/30 10:35:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 297 bytes. 2025/04/30 10:35:43 client <- Reading packet 1 (757 bytes) for connection (empty), Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 10:35:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:35:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4a5983e12f9140644b4f6d4a566eb680041b6f, InitialSourceConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:43 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f 2025/04/30 10:35:43 client Long Header{Type: Initial, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client Dropping Initial keys. 2025/04/30 10:35:43 client -> Sending packet 1 (110 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:43 client Short Header{DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:43 client -> Sending packet 2 (86 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client -> Sending packet 3 (86 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:43 client -> Sending packet 4 (86 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client -> Sending packet 5 (86 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:43 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:43 client <- Reading packet 4 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.PingFrame{} 2025/04/30 10:35:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:43 client <- Reading packet 5 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:43 client <- &wire.PingFrame{} 2025/04/30 10:35:43 client -> Sending packet 1 (44 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:43 client Short Header{DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 122.338µs} 2025/04/30 10:35:44 client <- Reading packet 7 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 113.456ms} 2025/04/30 10:35:44 client Peer doesn't await address validation any longer. 2025/04/30 10:35:44 client <- &wire.PingFrame{} 2025/04/30 10:35:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:44 client -> Sending packet 2 (46 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 163.324µs} 2025/04/30 10:35:44 client <- Reading packet 9 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 101.52ms} 2025/04/30 10:35:44 client <- &wire.PingFrame{} 2025/04/30 10:35:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:44 client -> Sending packet 3 (48 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 117.789µs} 2025/04/30 10:35:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:35:44 client -> Sending packet 6 (86 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:44 client -> Sending packet 7 (86 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: e91519c863d21c3b54e630363b12eb2d51302085, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:44 client <- Reading packet 10 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b79a50116add37c3685cc61013eeb7855c102bf, StatelessResetToken: 0xb218d7b7515e830ac0261157a95271a6} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8a5a4bc543966ca7e03b80c633b72a7d2a6690a7, StatelessResetToken: 0x9e0b8c8df076d83f7250a145b385ec22} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4df87f1255526745d80b0ab3ff00ea7b1147f0ff, StatelessResetToken: 0x19b263cb685657a19c5ade9f3ed6e06d} 2025/04/30 10:35:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:44 client Dropping Handshake keys. 2025/04/30 10:35:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:44 client -> Sending packet 5 (69 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 2b79a50116add37c3685cc61013eeb7855c102bf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 128.039µs} 2025/04/30 10:35:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:44 client -> Sending packet 6 (60 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 2b79a50116add37c3685cc61013eeb7855c102bf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:44 client <- Reading packet 11 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 168µs} 2025/04/30 10:35:44 client newly acked packets (1): [6] 2025/04/30 10:35:44 client updated RTT: 33.037ms (σ: 12.76ms) 2025/04/30 10:35:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:44 client Canceling loss detection timer. 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 0e8efb7bd12323427f44c532b376930865baf9d9, StatelessResetToken: 0xd71fbd568fbd840eb15040d550a60b23} 2025/04/30 10:35:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:44 client -> Sending packet 7 (42 bytes) for connection 4a5983e12f9140644b4f6d4a566eb680041b6f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 2b79a50116add37c3685cc61013eeb7855c102bf, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:44 client Connection 4a5983e12f9140644b4f6d4a566eb680041b6f closed. 2025/04/30 10:35:44 Requesting https://server4:443/iifnbsylsp. 2025/04/30 10:35:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:44 Increased send buffer size to 14336 kiB 2025/04/30 10:35:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:44 Created qlog file: /logs/qlog/9c935bde5517b71917565c.sqlog 2025/04/30 10:35:44 client Starting new connection to server4 ([::]:36462 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9c935bde5517b71917565c, version v1 2025/04/30 10:35:44 Adding connection ID (empty). 2025/04/30 10:35:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:44 client -> Sending packet 0 (1280 bytes) for connection 9c935bde5517b71917565c, Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: 9c935bde5517b71917565c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 10:35:44 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:44 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:44 client Received first packet. Switching destination connection ID to: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 10:35:44 client newly acked packets (1): [0] 2025/04/30 10:35:44 client updated RTT: 33.094437ms (σ: 16.547218ms) 2025/04/30 10:35:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 306 bytes. 2025/04/30 10:35:44 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, PacketNumber: 1, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:35:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:35:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9c935bde5517b71917565c, InitialSourceConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:44 client Dropping %!s(logging.PacketType=5) packet (306 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9c935bde5517b71917565c 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:44 client Dropping Initial keys. 2025/04/30 10:35:44 client -> Sending packet 1 (52 bytes) for connection 9c935bde5517b71917565c, Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:44 client -> Sending packet 0 (58 bytes) for connection 9c935bde5517b71917565c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 51da8e82745c9e7ca011b3c2266a4c8b1b6fb7a2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:44 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:35:44 client Peer doesn't await address validation any longer. 2025/04/30 10:35:44 client newly acked packets (1): [0] 2025/04/30 10:35:44 client updated RTT: 33.074ms (σ: 12.449ms) 2025/04/30 10:35:44 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:44 client Canceling loss detection timer. 2025/04/30 10:35:44 client Dropping Handshake keys. 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1ed63e510b8d59274a8c1565a25753a5076fbba4, StatelessResetToken: 0xa2bb8a0c99483364a0b1652c2b22afba} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e17ab45858602fac34414db471670cf29e8021aa, StatelessResetToken: 0x3d9fb393386eaa05a0dffe9f2d3c3d0b} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 993dbf750a10bb2d216e10760233e67d869f1265, StatelessResetToken: 0x352522ba22bc7a14a0c9ac5ae4ec92d0} 2025/04/30 10:35:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:44 client -> Sending packet 1 (46 bytes) for connection 9c935bde5517b71917565c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 1ed63e510b8d59274a8c1565a25753a5076fbba4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 188.551µs} 2025/04/30 10:35:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:44 client -> Sending packet 2 (42 bytes) for connection 9c935bde5517b71917565c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 1ed63e510b8d59274a8c1565a25753a5076fbba4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:44 client Connection 9c935bde5517b71917565c closed. 2025/04/30 10:35:44 Requesting https://server4:443/nalrdvvnin. 2025/04/30 10:35:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:44 Increased send buffer size to 14336 kiB 2025/04/30 10:35:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:44 Created qlog file: /logs/qlog/c29b97276b7d629ada06816c7e4f.sqlog 2025/04/30 10:35:44 client Starting new connection to server4 ([::]:40607 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c29b97276b7d629ada06816c7e4f, version v1 2025/04/30 10:35:44 Adding connection ID (empty). 2025/04/30 10:35:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:44 client -> Sending packet 0 (1280 bytes) for connection c29b97276b7d629ada06816c7e4f, Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: c29b97276b7d629ada06816c7e4f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:44 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:44 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:44 client Received first packet. Switching destination connection ID to: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:35:44 client newly acked packets (1): [0] 2025/04/30 10:35:44 client updated RTT: 33.090097ms (σ: 16.545048ms) 2025/04/30 10:35:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Parsed a coalesced packet. Part 2: 752 bytes. Remaining: 302 bytes. 2025/04/30 10:35:44 client <- Reading packet 1 (752 bytes) for connection (empty), Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, PacketNumber: 1, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:35:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:35:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c29b97276b7d629ada06816c7e4f, InitialSourceConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:44 client Dropping %!s(logging.PacketType=5) packet (302 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c29b97276b7d629ada06816c7e4f 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:44 client Dropping Initial keys. 2025/04/30 10:35:44 client -> Sending packet 1 (52 bytes) for connection c29b97276b7d629ada06816c7e4f, Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:44 client -> Sending packet 0 (58 bytes) for connection c29b97276b7d629ada06816c7e4f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:44 client -> Sending packet 2 (86 bytes) for connection c29b97276b7d629ada06816c7e4f, Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:44 client -> Sending packet 3 (86 bytes) for connection c29b97276b7d629ada06816c7e4f, Handshake 2025/04/30 10:35:44 client Long Header{Type: Handshake, DestConnectionID: 17e046625527e0516c7d4d9eed6aacd7cbcf1ef2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:44 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4217360a0f6c0949b19649c7502e3c115e02bd8a, StatelessResetToken: 0xcc7bd3c75a7113fa8231b7f8749e0520} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d470289388b447836f23e4ae5dcd0a922e6f84b, StatelessResetToken: 0xe344ed8f49fb45ae7c58ca66db8e31b0} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 97afe52f2ec54f44ccf3fedc89b755c3cb826d32, StatelessResetToken: 0x10c29974c98cb0ee07437f83ff74ca02} 2025/04/30 10:35:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:44 client Dropping Handshake keys. 2025/04/30 10:35:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:44 client -> Sending packet 2 (65 bytes) for connection c29b97276b7d629ada06816c7e4f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 4217360a0f6c0949b19649c7502e3c115e02bd8a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 153.727µs} 2025/04/30 10:35:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:44 client -> Sending packet 3 (60 bytes) for connection c29b97276b7d629ada06816c7e4f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 4217360a0f6c0949b19649c7502e3c115e02bd8a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:44 client <- Reading packet 4 (1093 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:44 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112.616ms} 2025/04/30 10:35:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 99d90ca6df31b137122137ba1c915648eb1938b0, StatelessResetToken: 0x8bb064e3e0b9aab0d6799d837e1538ce} 2025/04/30 10:35:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:44 client -> Sending packet 4 (46 bytes) for connection c29b97276b7d629ada06816c7e4f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 4217360a0f6c0949b19649c7502e3c115e02bd8a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 185.767µs} 2025/04/30 10:35:44 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:44 client -> Sending packet 5 (42 bytes) for connection c29b97276b7d629ada06816c7e4f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:44 client Short Header{DestConnectionID: 4217360a0f6c0949b19649c7502e3c115e02bd8a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:44 client Connection c29b97276b7d629ada06816c7e4f closed. 2025/04/30 10:35:44 Requesting https://server4:443/xxniqhqsns. 2025/04/30 10:35:44 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:44 Increased send buffer size to 14336 kiB 2025/04/30 10:35:44 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:44 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:44 Created qlog file: /logs/qlog/ba244a18946edaebd384e775.sqlog 2025/04/30 10:35:44 client Starting new connection to server4 ([::]:49205 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ba244a18946edaebd384e775, version v1 2025/04/30 10:35:44 Adding connection ID (empty). 2025/04/30 10:35:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:44 client -> Sending packet 0 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: ba244a18946edaebd384e775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:44 client -> Sending packet 1 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: ba244a18946edaebd384e775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:44 client -> Sending packet 2 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:44 client Long Header{Type: Initial, DestConnectionID: ba244a18946edaebd384e775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:45 client -> Sending packet 3 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:45 client Long Header{Type: Initial, DestConnectionID: ba244a18946edaebd384e775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:45 client -> Sending packet 4 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:45 client Long Header{Type: Initial, DestConnectionID: ba244a18946edaebd384e775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:35:45 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:45 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:45 client Received first packet. Switching destination connection ID to: ba143ad453e2ec6fc0065ca348826f75ee921905 2025/04/30 10:35:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 72µs} 2025/04/30 10:35:45 client newly acked packets (1): [4] 2025/04/30 10:35:45 client updated RTT: 34.002307ms (σ: 17.001153ms) 2025/04/30 10:35:45 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:45 client -> Sending packet 5 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:45 client Long Header{Type: Initial, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:45 client -> &wire.PingFrame{} 2025/04/30 10:35:45 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:45 client <- Reading packet 3 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 598.928ms} 2025/04/30 10:35:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:45 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:45 client -> Sending packet 6 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:45 client Long Header{Type: Initial, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:45 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:35:45 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:35:46 client -> Sending packet 7 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:46 client Long Header{Type: Initial, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:46 client -> &wire.PingFrame{} 2025/04/30 10:35:46 client -> Sending packet 8 (1280 bytes) for connection ba244a18946edaebd384e775, Initial 2025/04/30 10:35:46 client Long Header{Type: Initial, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:46 client -> &wire.PingFrame{} 2025/04/30 10:35:46 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:35:46 client <- Reading packet 4 (56 bytes) for connection (empty), Initial 2025/04/30 10:35:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 10:35:46 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 72µs} 2025/04/30 10:35:46 client newly acked packets (1): [8] 2025/04/30 10:35:46 client updated RTT: 34.008ms (σ: 12.763ms) 2025/04/30 10:35:46 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:35:46 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:46 client <- Reading packet 5 (749 bytes) for connection (empty), Handshake 2025/04/30 10:35:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, PacketNumber: 5, PacketNumberLen: 1, Length: 720, Version: v1} 2025/04/30 10:35:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:35:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ba244a18946edaebd384e775, InitialSourceConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:46 client <- Reading packet 6 (50 bytes) for connection (empty), Handshake 2025/04/30 10:35:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, PacketNumber: 6, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:35:46 client <- &wire.PingFrame{} 2025/04/30 10:35:46 client -> Sending packet 0 (91 bytes) for connection ba244a18946edaebd384e775, Handshake 2025/04/30 10:35:46 client Long Header{Type: Handshake, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:46 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:35:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:46 client Dropping Initial keys. 2025/04/30 10:35:46 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:46 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:46 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:46 client -> Sending packet 0 (58 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:46 client Short Header{DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:46 client -> Sending packet 1 (86 bytes) for connection ba244a18946edaebd384e775, Handshake 2025/04/30 10:35:46 client Long Header{Type: Handshake, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:46 client -> Sending packet 2 (86 bytes) for connection ba244a18946edaebd384e775, Handshake 2025/04/30 10:35:46 client Long Header{Type: Handshake, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:47 client <- Reading packet 8 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.PingFrame{} 2025/04/30 10:35:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:47 client -> Sending packet 1 (44 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 118.029µs} 2025/04/30 10:35:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:47 client -> Sending packet 3 (86 bytes) for connection ba244a18946edaebd384e775, Handshake 2025/04/30 10:35:47 client Long Header{Type: Handshake, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:47 client -> Sending packet 4 (86 bytes) for connection ba244a18946edaebd384e775, Handshake 2025/04/30 10:35:47 client Long Header{Type: Handshake, DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:47 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.PingFrame{} 2025/04/30 10:35:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:47 client -> Sending packet 2 (46 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: ba143ad453e2ec6fc0065ca348826f75ee921905, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}}, DelayTime: 105.606µs} 2025/04/30 10:35:47 client <- Reading packet 11 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, StatelessResetToken: 0x2e02658599703de944f7c1f5036a74d2} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70e9fd0aecc435e3497c0a50f206296a99c04977, StatelessResetToken: 0x5ef8095cd0f9ed465e889f75f8822d26} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bd58094850511451cc3b92539883f71a92fba81d, StatelessResetToken: 0x34b89f110c114f45f4cb9c815532db4a} 2025/04/30 10:35:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:47 client Dropping Handshake keys. 2025/04/30 10:35:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:47 client -> Sending packet 4 (67 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 8, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}}, DelayTime: 126.736µs} 2025/04/30 10:35:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client -> Sending packet 5 (60 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:47 client -> Sending packet 7 (60 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client -> Sending packet 8 (60 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client -> Sending packet 9 (1315 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.PingFrame{} 2025/04/30 10:35:47 client <- Reading packet 13 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 176µs} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: a47af59f49658de4b2215768155e44b0252efc10, StatelessResetToken: 0xf55728cb12748794e93cfeb91813de4b} 2025/04/30 10:35:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:47 client <- Reading packet 14 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 40µs} 2025/04/30 10:35:47 client newly acked packets (1): [9] 2025/04/30 10:35:47 client updated RTT: 33.772ms (σ: 10.043ms) 2025/04/30 10:35:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:47 client setting loss timer for packet 8 (1-RTT) to 37.9935ms (in 2025-04-30 10:35:47.595808747 +0000 UTC m=+60.606497235) 2025/04/30 10:35:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:47 client -> Sending packet 10 (42 bytes) for connection ba244a18946edaebd384e775, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 0a10ad2209c409216b0c60bb1a006ab81b01a65e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:47 client Connection ba244a18946edaebd384e775 closed. 2025/04/30 10:35:47 Requesting https://server4:443/vatpefsrrv. 2025/04/30 10:35:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:47 Increased send buffer size to 14336 kiB 2025/04/30 10:35:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:47 Created qlog file: /logs/qlog/afdd1be555a3e6fd2d72.sqlog 2025/04/30 10:35:47 client Starting new connection to server4 ([::]:39441 -> 193.167.100.100:443), source connection ID (empty), destination connection ID afdd1be555a3e6fd2d72, version v1 2025/04/30 10:35:47 Adding connection ID (empty). 2025/04/30 10:35:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:47 client -> Sending packet 0 (1280 bytes) for connection afdd1be555a3e6fd2d72, Initial 2025/04/30 10:35:47 client Long Header{Type: Initial, DestConnectionID: afdd1be555a3e6fd2d72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:35:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:35:47 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:47 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:47 client Received first packet. Switching destination connection ID to: b71c15e473a188a403f48dc98e2c236843625c47 2025/04/30 10:35:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 10:35:47 client newly acked packets (1): [0] 2025/04/30 10:35:47 client updated RTT: 33.060462ms (σ: 16.530231ms) 2025/04/30 10:35:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:47 client Parsed a coalesced packet. Part 2: 748 bytes. Remaining: 306 bytes. 2025/04/30 10:35:47 client <- Reading packet 1 (748 bytes) for connection (empty), Handshake 2025/04/30 10:35:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, PacketNumber: 1, PacketNumberLen: 1, Length: 719, Version: v1} 2025/04/30 10:35:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:35:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: afdd1be555a3e6fd2d72, InitialSourceConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:47 client Dropping %!s(logging.PacketType=5) packet (306 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection afdd1be555a3e6fd2d72 2025/04/30 10:35:47 client Long Header{Type: Initial, DestConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:47 client Long Header{Type: Handshake, DestConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:47 client Dropping Initial keys. 2025/04/30 10:35:47 client -> Sending packet 1 (52 bytes) for connection afdd1be555a3e6fd2d72, Handshake 2025/04/30 10:35:47 client Long Header{Type: Handshake, DestConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:47 client -> Sending packet 0 (58 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: b71c15e473a188a403f48dc98e2c236843625c47, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, StatelessResetToken: 0xb6db1267656ad099754a054bedf525d0} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3d9b0fca5c01eb439634429a2afccb7881f52cd5, StatelessResetToken: 0x5414db6f4f017a1a77879e1bd9560c9e} 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 919ad831262425286fa2fe6d81c2e126fbfd5dd5, StatelessResetToken: 0x40f8658a893d0c1d185848da861eb740} 2025/04/30 10:35:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:47 client Dropping Handshake keys. 2025/04/30 10:35:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:47 client -> Sending packet 1 (46 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 129.902µs} 2025/04/30 10:35:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:47 client <- Reading packet 3 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 104µs} 2025/04/30 10:35:47 client newly acked packets (1): [1] 2025/04/30 10:35:47 client updated RTT: 32.796ms (σ: 12.925ms) 2025/04/30 10:35:47 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:47 client lost packet 0 (time threshold) 2025/04/30 10:35:47 client Canceling loss detection timer. 2025/04/30 10:35:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: a8e2802e510014bdd57631a043405e6b2a35fc6d, StatelessResetToken: 0x6ef52d213d2cfd3641f6ee7ee2c39e0d} 2025/04/30 10:35:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:47 client Ignoring all packets below 3. 2025/04/30 10:35:47 client -> Sending packet 2 (63 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 184.023µs} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:47 client -> Sending packet 4 (58 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client -> Sending packet 5 (58 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:47 client <- Reading packet 5 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 101.544ms} 2025/04/30 10:35:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:47 client -> Sending packet 6 (1315 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.PingFrame{} 2025/04/30 10:35:47 client -> Sending packet 7 (46 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 144.119µs} 2025/04/30 10:35:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:47 client -> Sending packet 8 (42 bytes) for connection afdd1be555a3e6fd2d72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:47 client Short Header{DestConnectionID: 5958acdb9fb66d0a899cf41bb2e632e8a29619ff, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:47 client Connection afdd1be555a3e6fd2d72 closed. 2025/04/30 10:35:47 Requesting https://server4:443/gehpijvppr. 2025/04/30 10:35:47 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:47 Increased send buffer size to 14336 kiB 2025/04/30 10:35:47 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:47 Created qlog file: /logs/qlog/7223016bf39e86f1c973c4.sqlog 2025/04/30 10:35:47 client Starting new connection to server4 ([::]:53242 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7223016bf39e86f1c973c4, version v1 2025/04/30 10:35:47 Adding connection ID (empty). 2025/04/30 10:35:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:47 client -> Sending packet 0 (1280 bytes) for connection 7223016bf39e86f1c973c4, Initial 2025/04/30 10:35:47 client Long Header{Type: Initial, DestConnectionID: 7223016bf39e86f1c973c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:48 client -> Sending packet 1 (1280 bytes) for connection 7223016bf39e86f1c973c4, Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: 7223016bf39e86f1c973c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:48 client -> Sending packet 2 (1280 bytes) for connection 7223016bf39e86f1c973c4, Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: 7223016bf39e86f1c973c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 10:35:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:48 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:48 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:48 client Received first packet. Switching destination connection ID to: a759c00cd0cfd39d170d7b891390ee3045eaffca 2025/04/30 10:35:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 10:35:48 client newly acked packets (1): [2] 2025/04/30 10:35:48 client updated RTT: 34.01973ms (σ: 17.009865ms) 2025/04/30 10:35:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:48 client -> Sending packet 3 (1280 bytes) for connection 7223016bf39e86f1c973c4, Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:48 client -> &wire.PingFrame{} 2025/04/30 10:35:48 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:48 client <- Reading packet 4 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:48 client newly acked packets (1): [3] 2025/04/30 10:35:48 client updated RTT: 33.905ms (σ: 12.984ms) 2025/04/30 10:35:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:48 client -> Sending packet 4 (1280 bytes) for connection 7223016bf39e86f1c973c4, Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:48 client -> &wire.PingFrame{} 2025/04/30 10:35:48 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:48 client <- Reading packet 5 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 120µs} 2025/04/30 10:35:48 client newly acked packets (1): [4] 2025/04/30 10:35:48 client updated RTT: 33.796ms (σ: 9.955ms) 2025/04/30 10:35:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:48 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:35:48 client <- Reading packet 6 (149 bytes) for connection (empty), Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:35:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 184.616ms} 2025/04/30 10:35:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:48 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:35:48 client -> Sending packet 5 (1280 bytes) for connection 7223016bf39e86f1c973c4, Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:48 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:35:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:48 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:48 client <- Reading packet 8 (750 bytes) for connection (empty), Handshake 2025/04/30 10:35:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, PacketNumber: 8, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:35:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:35:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7223016bf39e86f1c973c4, InitialSourceConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:48 client -> Sending packet 0 (91 bytes) for connection 7223016bf39e86f1c973c4, Handshake 2025/04/30 10:35:48 client Long Header{Type: Handshake, DestConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:48 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:35:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:48 client Dropping Initial keys. 2025/04/30 10:35:48 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:48 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:48 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:48 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:48 client -> Sending packet 0 (58 bytes) for connection 7223016bf39e86f1c973c4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:48 client Short Header{DestConnectionID: a759c00cd0cfd39d170d7b891390ee3045eaffca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:48 client <- Reading packet 9 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:48 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:48 client Peer doesn't await address validation any longer. 2025/04/30 10:35:48 client newly acked packets (1): [0] 2025/04/30 10:35:48 client updated RTT: 33.585ms (σ: 7.886ms) 2025/04/30 10:35:48 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:48 client Canceling loss detection timer. 2025/04/30 10:35:48 client Dropping Handshake keys. 2025/04/30 10:35:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af0ca2db033a4231f61eedc5c10aa2e19d335f3f, StatelessResetToken: 0x3d5f84fd32203e5bb7e2ad663f6d1fbd} 2025/04/30 10:35:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c3c3ecc52a1d09a623be2e78acbb146ca2f1eb0, StatelessResetToken: 0xe78c8215fed92db75ce7e6b52e1743da} 2025/04/30 10:35:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bef516a5a5171c1a567928b92b9d03ecbdcd3ace, StatelessResetToken: 0xf0da57a9000b6e1e631baf190f5b395e} 2025/04/30 10:35:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:48 client -> Sending packet 1 (46 bytes) for connection 7223016bf39e86f1c973c4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:48 client Short Header{DestConnectionID: af0ca2db033a4231f61eedc5c10aa2e19d335f3f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:48 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 225.391µs} 2025/04/30 10:35:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:48 client -> Sending packet 2 (42 bytes) for connection 7223016bf39e86f1c973c4, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:48 client Short Header{DestConnectionID: af0ca2db033a4231f61eedc5c10aa2e19d335f3f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:48 client Connection 7223016bf39e86f1c973c4 closed. 2025/04/30 10:35:48 Requesting https://server4:443/yxqaaverqz. 2025/04/30 10:35:48 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:48 Increased send buffer size to 14336 kiB 2025/04/30 10:35:48 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:48 Created qlog file: /logs/qlog/f8bd6a34460e871fa6a68a9e9b72.sqlog 2025/04/30 10:35:48 client Starting new connection to server4 ([::]:35040 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f8bd6a34460e871fa6a68a9e9b72, version v1 2025/04/30 10:35:48 Adding connection ID (empty). 2025/04/30 10:35:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:48 client -> Sending packet 0 (1280 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, Initial 2025/04/30 10:35:48 client Long Header{Type: Initial, DestConnectionID: f8bd6a34460e871fa6a68a9e9b72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:49 client -> Sending packet 1 (1280 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, Initial 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: f8bd6a34460e871fa6a68a9e9b72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:49 client -> Sending packet 2 (1280 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, Initial 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: f8bd6a34460e871fa6a68a9e9b72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 10:35:49 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:49 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:49 client Received first packet. Switching destination connection ID to: 571cae89fd7b1022a41ad2428e80d1481ccad51d 2025/04/30 10:35:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 360µs} 2025/04/30 10:35:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 301 bytes. 2025/04/30 10:35:49 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, PacketNumber: 1, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f8bd6a34460e871fa6a68a9e9b72, InitialSourceConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:49 client Dropping %!s(logging.PacketType=5) packet (301 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f8bd6a34460e871fa6a68a9e9b72 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 client Dropping Initial keys. 2025/04/30 10:35:49 client -> Sending packet 1 (52 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:49 client -> Sending packet 0 (58 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:49 client Short Header{DestConnectionID: 571cae89fd7b1022a41ad2428e80d1481ccad51d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:49 client <- Reading packet 3 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:49 client Peer doesn't await address validation any longer. 2025/04/30 10:35:49 client newly acked packets (1): [0] 2025/04/30 10:35:49 client updated RTT: 33.125062ms (σ: 16.562531ms) 2025/04/30 10:35:49 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:49 client Canceling loss detection timer. 2025/04/30 10:35:49 client Dropping Handshake keys. 2025/04/30 10:35:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 84265d1429001e71483c327298c995ac5ca1ab86, StatelessResetToken: 0x4c85ec70c7ce372245c1f449987b45bf} 2025/04/30 10:35:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 371f30726c5bd1794ec4cc17e302d76225404133, StatelessResetToken: 0x9d70dfcd0a9de867128df0417c70bd7c} 2025/04/30 10:35:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5347c5fe7d8a38b82d74c370fc7a8de342fdc21d, StatelessResetToken: 0x365bf03d5342da050db81c62ab010b55} 2025/04/30 10:35:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:49 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:49 client -> Sending packet 1 (46 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:49 client Short Header{DestConnectionID: 84265d1429001e71483c327298c995ac5ca1ab86, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 232.023µs} 2025/04/30 10:35:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:49 client -> Sending packet 2 (42 bytes) for connection f8bd6a34460e871fa6a68a9e9b72, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:49 client Short Header{DestConnectionID: 84265d1429001e71483c327298c995ac5ca1ab86, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:49 client Connection f8bd6a34460e871fa6a68a9e9b72 closed. 2025/04/30 10:35:49 Requesting https://server4:443/fuyjrdobsj. 2025/04/30 10:35:49 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:49 Increased send buffer size to 14336 kiB 2025/04/30 10:35:49 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:49 Created qlog file: /logs/qlog/577f3ed4ab9a1ca63b20f488a43eeb185c74.sqlog 2025/04/30 10:35:49 client Starting new connection to server4 ([::]:51558 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 577f3ed4ab9a1ca63b20f488a43eeb185c74, version v1 2025/04/30 10:35:49 Adding connection ID (empty). 2025/04/30 10:35:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:49 client -> Sending packet 0 (1280 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Initial 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: 577f3ed4ab9a1ca63b20f488a43eeb185c74, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 10:35:49 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:49 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:49 client Received first packet. Switching destination connection ID to: ec3e48d8ca47409d593c400538652d7cacc0551c 2025/04/30 10:35:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 10:35:49 client newly acked packets (1): [0] 2025/04/30 10:35:49 client updated RTT: 33.302594ms (σ: 16.651297ms) 2025/04/30 10:35:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Parsed a coalesced packet. Part 2: 756 bytes. Remaining: 298 bytes. 2025/04/30 10:35:49 client <- Reading packet 1 (756 bytes) for connection (empty), Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 1, PacketNumberLen: 1, Length: 727, Version: v1} 2025/04/30 10:35:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:35:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 577f3ed4ab9a1ca63b20f488a43eeb185c74, InitialSourceConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:49 client Dropping %!s(logging.PacketType=5) packet (298 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74 2025/04/30 10:35:49 client Long Header{Type: Initial, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 client Dropping Initial keys. 2025/04/30 10:35:49 client -> Sending packet 1 (52 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:49 client -> Sending packet 0 (58 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:49 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:49 client -> Sending packet 2 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 client -> Sending packet 3 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:49 client -> Sending packet 4 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 client -> Sending packet 5 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 10:35:49 client -> Sending packet 6 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:49 client -> Sending packet 7 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:49 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:50 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:50 client <- &wire.PingFrame{} 2025/04/30 10:35:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:50 client -> Sending packet 1 (44 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:50 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 102.641µs} 2025/04/30 10:35:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 10:35:50 client -> Sending packet 8 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:50 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:50 client -> Sending packet 9 (86 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, Handshake 2025/04/30 10:35:50 client Long Header{Type: Handshake, DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:50 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:50 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 358.032ms} 2025/04/30 10:35:50 client Peer doesn't await address validation any longer. 2025/04/30 10:35:50 client <- &wire.PingFrame{} 2025/04/30 10:35:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:50 client <- Reading packet 7 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:50 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 358.16ms} 2025/04/30 10:35:50 client <- &wire.PingFrame{} 2025/04/30 10:35:50 client -> Sending packet 2 (46 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:50 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:50 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 172µs} 2025/04/30 10:35:50 client <- Reading packet 9 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:50 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104.576ms} 2025/04/30 10:35:50 client <- &wire.PingFrame{} 2025/04/30 10:35:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:50 client -> Sending packet 3 (48 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:50 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:50 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 132.007µs} 2025/04/30 10:35:51 client <- Reading packet 10 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 312.512ms} 2025/04/30 10:35:51 client <- &wire.PingFrame{} 2025/04/30 10:35:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:51 client Sending ACK because the ACK timer expired. 2025/04/30 10:35:51 client -> Sending packet 4 (49 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.368453ms} 2025/04/30 10:35:51 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:51 client <- Reading packet 12 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 728.344ms} 2025/04/30 10:35:51 client <- &wire.PingFrame{} 2025/04/30 10:35:51 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:51 client <- Reading packet 13 (27 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 728.512ms} 2025/04/30 10:35:51 client <- &wire.PingFrame{} 2025/04/30 10:35:51 client -> Sending packet 5 (50 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 160.128µs} 2025/04/30 10:35:51 client <- Reading packet 15 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 92.488ms} 2025/04/30 10:35:51 client <- &wire.PingFrame{} 2025/04/30 10:35:51 client Queuing ACK because there's a new missing packet to report. 2025/04/30 10:35:51 client -> Sending packet 6 (52 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: ec3e48d8ca47409d593c400538652d7cacc0551c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 3, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 119.273µs} 2025/04/30 10:35:51 client <- Reading packet 16 (144 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 104µs} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d18220fd3c5dc7c926657b60714c75ed861504e, StatelessResetToken: 0xb23e8f7d7d9ad29567261ef8955da466} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d36072c97cbaf2d19855adc3b1e2fe8aa6b9a41, StatelessResetToken: 0xf0bb80ed9e30334613683e6d23f6148d} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 16db58ee5f7a4a89ea1ac10624341dba2707c235, StatelessResetToken: 0xfc060f0ec37b198286f97bfd29015855} 2025/04/30 10:35:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:51 client Dropping Handshake keys. 2025/04/30 10:35:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:51 client -> Sending packet 8 (73 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: 8d18220fd3c5dc7c926657b60714c75ed861504e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 3, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 142.886µs} 2025/04/30 10:35:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:51 client -> Sending packet 9 (60 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: 8d18220fd3c5dc7c926657b60714c75ed861504e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:51 client <- Reading packet 17 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 40µs} 2025/04/30 10:35:51 client newly acked packets (1): [9] 2025/04/30 10:35:51 client updated RTT: 33.127ms (σ: 12.838ms) 2025/04/30 10:35:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:51 client Canceling loss detection timer. 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: c4679dfcde3e38392d03eadd1910965c334b6ebc, StatelessResetToken: 0x712aed5b032dc3e2097b69c779039d24} 2025/04/30 10:35:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:51 client -> Sending packet 10 (42 bytes) for connection 577f3ed4ab9a1ca63b20f488a43eeb185c74, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:51 client Short Header{DestConnectionID: 8d18220fd3c5dc7c926657b60714c75ed861504e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:51 client Connection 577f3ed4ab9a1ca63b20f488a43eeb185c74 closed. 2025/04/30 10:35:51 Requesting https://server4:443/yvritaukqk. 2025/04/30 10:35:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:51 Increased send buffer size to 14336 kiB 2025/04/30 10:35:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:51 Created qlog file: /logs/qlog/d5c893af451567f0a517c6eec4178244b1b9f7.sqlog 2025/04/30 10:35:51 client Starting new connection to server4 ([::]:47805 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d5c893af451567f0a517c6eec4178244b1b9f7, version v1 2025/04/30 10:35:51 Adding connection ID (empty). 2025/04/30 10:35:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:51 client -> Sending packet 0 (1280 bytes) for connection d5c893af451567f0a517c6eec4178244b1b9f7, Initial 2025/04/30 10:35:51 client Long Header{Type: Initial, DestConnectionID: d5c893af451567f0a517c6eec4178244b1b9f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 10:35:51 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:51 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:51 client Received first packet. Switching destination connection ID to: d5f4fc2df9c4f3d59affb8692ead428b5938f10e 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 10:35:51 client newly acked packets (1): [0] 2025/04/30 10:35:51 client updated RTT: 33.001471ms (σ: 16.500735ms) 2025/04/30 10:35:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 296 bytes. 2025/04/30 10:35:51 client <- Reading packet 1 (758 bytes) for connection (empty), Handshake 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, PacketNumber: 1, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:35:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:35:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d5c893af451567f0a517c6eec4178244b1b9f7, InitialSourceConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:51 client Dropping %!s(logging.PacketType=5) packet (296 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d5c893af451567f0a517c6eec4178244b1b9f7 2025/04/30 10:35:51 client Long Header{Type: Initial, DestConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:51 client Dropping Initial keys. 2025/04/30 10:35:51 client -> Sending packet 1 (52 bytes) for connection d5c893af451567f0a517c6eec4178244b1b9f7, Handshake 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:51 client -> Sending packet 0 (58 bytes) for connection d5c893af451567f0a517c6eec4178244b1b9f7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: d5f4fc2df9c4f3d59affb8692ead428b5938f10e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:51 client <- Reading packet 2 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:35:51 client Peer doesn't await address validation any longer. 2025/04/30 10:35:51 client newly acked packets (1): [0] 2025/04/30 10:35:51 client updated RTT: 32.991ms (σ: 12.395ms) 2025/04/30 10:35:51 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:51 client Canceling loss detection timer. 2025/04/30 10:35:51 client Dropping Handshake keys. 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b58d49c49612085b64718c12a41757b78f2fe66e, StatelessResetToken: 0xef9d0da4dabddbe160864ee9906df211} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3095fb393cab3750d82381a1fea7801f4bb60de3, StatelessResetToken: 0xe16aa9ff79b998a2f83cd08edd77b5b2} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aaeef2b7126684adb3d7a0cc7d109f54dfb3a7bc, StatelessResetToken: 0x5e4afc509f03f965054d42966e82bc71} 2025/04/30 10:35:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:51 client -> Sending packet 1 (46 bytes) for connection d5c893af451567f0a517c6eec4178244b1b9f7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:51 client Short Header{DestConnectionID: b58d49c49612085b64718c12a41757b78f2fe66e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 174.926µs} 2025/04/30 10:35:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:51 client -> Sending packet 2 (42 bytes) for connection d5c893af451567f0a517c6eec4178244b1b9f7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:51 client Short Header{DestConnectionID: b58d49c49612085b64718c12a41757b78f2fe66e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:51 client Connection d5c893af451567f0a517c6eec4178244b1b9f7 closed. 2025/04/30 10:35:51 Requesting https://server4:443/clycpdzwuk. 2025/04/30 10:35:51 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:51 Increased send buffer size to 14336 kiB 2025/04/30 10:35:51 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:51 Created qlog file: /logs/qlog/50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e.sqlog 2025/04/30 10:35:51 client Starting new connection to server4 ([::]:35314 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, version v1 2025/04/30 10:35:51 Adding connection ID (empty). 2025/04/30 10:35:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:51 client -> Sending packet 0 (1280 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, Initial 2025/04/30 10:35:51 client Long Header{Type: Initial, DestConnectionID: 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:35:51 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:51 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:51 client Received first packet. Switching destination connection ID to: df29110443e2f4b55ddb36bc3ce24f849c3493f4 2025/04/30 10:35:51 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 10:35:51 client newly acked packets (1): [0] 2025/04/30 10:35:51 client updated RTT: 32.941281ms (σ: 16.47064ms) 2025/04/30 10:35:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 296 bytes. 2025/04/30 10:35:51 client <- Reading packet 1 (758 bytes) for connection (empty), Handshake 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, PacketNumber: 1, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:35:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:35:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, InitialSourceConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:51 client Dropping %!s(logging.PacketType=5) packet (296 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:51 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e 2025/04/30 10:35:51 client Long Header{Type: Initial, DestConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:51 client Dropping Initial keys. 2025/04/30 10:35:51 client -> Sending packet 1 (52 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, Handshake 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:51 client -> Sending packet 0 (58 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:51 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:51 client -> Sending packet 2 (86 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, Handshake 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:51 client -> Sending packet 3 (86 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, Handshake 2025/04/30 10:35:51 client Long Header{Type: Handshake, DestConnectionID: df29110443e2f4b55ddb36bc3ce24f849c3493f4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:51 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, StatelessResetToken: 0x599be0cc7261ab20f5ae2447c5439743} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 580e5b70766982f34f21452913e3ddf26269b638, StatelessResetToken: 0x66bc0cf84a693a9131f2824645eb634e} 2025/04/30 10:35:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac1b291cf508e08bf50c5afe6533e6903f1f585b, StatelessResetToken: 0xf58fc5e9fcc9fdeef2aa8903d4ab88de} 2025/04/30 10:35:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:51 client Dropping Handshake keys. 2025/04/30 10:35:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:51 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:51 client -> Sending packet 2 (65 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112.8µs} 2025/04/30 10:35:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:51 client -> Sending packet 3 (60 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:51 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:52 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:52 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:52 client <- &wire.PingFrame{} 2025/04/30 10:35:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:52 client Sending ACK because the ACK timer expired. 2025/04/30 10:35:52 client -> Sending packet 4 (45 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:52 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:52 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.312646ms} 2025/04/30 10:35:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:35:52 client -> Sending packet 6 (60 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:52 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:52 client -> Sending packet 7 (60 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:52 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:52 client -> Sending packet 8 (1315 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:52 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:52 client -> &wire.PingFrame{} 2025/04/30 10:35:52 client <- Reading packet 4 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:52 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:52 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 48µs} 2025/04/30 10:35:52 client newly acked packets (1): [7] 2025/04/30 10:35:52 client updated RTT: 32.821ms (σ: 12.591ms) 2025/04/30 10:35:52 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:52 client Canceling loss detection timer. 2025/04/30 10:35:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 4a5c836eb0c595809c0a294010dd4ff64459c80f, StatelessResetToken: 0x9d9fb1f30e6b9d2055b32701073016c5} 2025/04/30 10:35:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:52 client <- Reading packet 5 (25 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:52 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:52 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 48µs} 2025/04/30 10:35:52 client newly acked packets (1): [8] 2025/04/30 10:35:52 client updated RTT: 32.721ms (σ: 9.642ms) 2025/04/30 10:35:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:52 client -> Sending packet 9 (42 bytes) for connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:52 client Short Header{DestConnectionID: d7ddba3fcbd4758726d41773b1e460d27107c1e0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:52 client Connection 50f9fbe4abd881d5dadf5689cdec6a66e9e81d1e closed. 2025/04/30 10:35:52 Requesting https://server4:443/yftvjaxigb. 2025/04/30 10:35:52 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:52 Increased send buffer size to 14336 kiB 2025/04/30 10:35:52 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:52 Created qlog file: /logs/qlog/c1c9150f7968311441d63c8f.sqlog 2025/04/30 10:35:52 client Starting new connection to server4 ([::]:47885 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c1c9150f7968311441d63c8f, version v1 2025/04/30 10:35:52 Adding connection ID (empty). 2025/04/30 10:35:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:52 client -> Sending packet 0 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: c1c9150f7968311441d63c8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:52 client -> Sending packet 1 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: c1c9150f7968311441d63c8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:52 client -> Sending packet 2 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: c1c9150f7968311441d63c8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 10:35:52 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:52 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:52 client Received first packet. Switching destination connection ID to: eebb8feaa5b25e4820ad503de5c9933da9e5b759 2025/04/30 10:35:52 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 10:35:52 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:52 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:52 client <- Reading packet 3 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 10:35:52 client newly acked packets (1): [2] 2025/04/30 10:35:52 client updated RTT: 33.717648ms (σ: 16.858824ms) 2025/04/30 10:35:52 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:52 client -> Sending packet 3 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:52 client -> &wire.PingFrame{} 2025/04/30 10:35:52 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:52 client <- Reading packet 4 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:52 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 88µs} 2025/04/30 10:35:52 client newly acked packets (1): [3] 2025/04/30 10:35:52 client updated RTT: 33.632ms (σ: 12.813ms) 2025/04/30 10:35:52 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:53 client -> Sending packet 4 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:53 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:53 client -> &wire.PingFrame{} 2025/04/30 10:35:53 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 10:35:53 client -> Sending packet 5 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:53 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:53 client -> &wire.PingFrame{} 2025/04/30 10:35:53 client -> Sending packet 6 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:53 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:53 client -> &wire.PingFrame{} 2025/04/30 10:35:53 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:35:53 client <- Reading packet 7 (54 bytes) for connection (empty), Initial 2025/04/30 10:35:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:35:53 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 104µs} 2025/04/30 10:35:53 client newly acked packets (1): [6] 2025/04/30 10:35:53 client updated RTT: 33.677ms (σ: 9.699ms) 2025/04/30 10:35:53 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:54 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:54 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:54 client Queueing packet (751 bytes) for later decryption 2025/04/30 10:35:54 client -> Sending packet 7 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:54 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:54 client -> &wire.PingFrame{} 2025/04/30 10:35:56 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:35:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:56 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:57 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:35:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 6 2025/04/30 10:35:57 client -> Sending packet 8 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:57 client -> &wire.PingFrame{} 2025/04/30 10:35:57 client -> Sending packet 9 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:57 client -> &wire.PingFrame{} 2025/04/30 10:35:57 client Parsed a coalesced packet. Part 1: 151 bytes. Remaining: 1049 bytes. 2025/04/30 10:35:57 client <- Reading packet 10 (151 bytes) for connection (empty), Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 3.506744s} 2025/04/30 10:35:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Queueing packet (1049 bytes) for later decryption 2025/04/30 10:35:57 client -> Sending packet 10 (1280 bytes) for connection c1c9150f7968311441d63c8f, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:35:57 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:57 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:57 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:35:57 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:35:57 client <- Reading packet 8 (751 bytes) for connection (empty), Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, PacketNumber: 8, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:35:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:35:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c1c9150f7968311441d63c8f, InitialSourceConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (1049 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (1146 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client -> Sending packet 0 (91 bytes) for connection c1c9150f7968311441d63c8f, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client Dropping Initial keys. 2025/04/30 10:35:57 client -> Sending packet 0 (58 bytes) for connection c1c9150f7968311441d63c8f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: eebb8feaa5b25e4820ad503de5c9933da9e5b759, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=0) packet (56 bytes) because we already dropped the keys. 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client <- Reading packet 14 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:57 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 10:35:57 client Peer doesn't await address validation any longer. 2025/04/30 10:35:57 client newly acked packets (1): [0] 2025/04/30 10:35:57 client updated RTT: 33.519ms (σ: 7.588ms) 2025/04/30 10:35:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:57 client Canceling loss detection timer. 2025/04/30 10:35:57 client Dropping Handshake keys. 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 50b71e949d5d58b59faa065569ce24639156c4f8, StatelessResetToken: 0xdb3458dad48d39e08aa89f0d0b42ae74} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b596394c0883469a7d933c52776e826ac32002c, StatelessResetToken: 0x01fb6db7f5c1e4bbaaecf983e382a1c2} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ef82e05f546eef4e544c05433795c1fc58d277b, StatelessResetToken: 0x042f741865b0ac8aa9e0d1e97a32514a} 2025/04/30 10:35:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:57 client -> Sending packet 1 (46 bytes) for connection c1c9150f7968311441d63c8f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 50b71e949d5d58b59faa065569ce24639156c4f8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 217.245µs} 2025/04/30 10:35:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:57 client -> Sending packet 2 (42 bytes) for connection c1c9150f7968311441d63c8f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 50b71e949d5d58b59faa065569ce24639156c4f8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:57 client Connection c1c9150f7968311441d63c8f closed. 2025/04/30 10:35:57 Requesting https://server4:443/ucufinvyvp. 2025/04/30 10:35:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:57 Increased send buffer size to 14336 kiB 2025/04/30 10:35:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:57 Created qlog file: /logs/qlog/8ace98c950cb4c4bdd8a253f1504e070b8bc03.sqlog 2025/04/30 10:35:57 client Starting new connection to server4 ([::]:46108 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8ace98c950cb4c4bdd8a253f1504e070b8bc03, version v1 2025/04/30 10:35:57 Adding connection ID (empty). 2025/04/30 10:35:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:57 client -> Sending packet 0 (1280 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: 8ace98c950cb4c4bdd8a253f1504e070b8bc03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 10:35:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:57 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:57 client Received first packet. Switching destination connection ID to: f799f78db02c365dc9c45e7a2e3012366d482d12 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 10:35:57 client newly acked packets (1): [0] 2025/04/30 10:35:57 client updated RTT: 32.952963ms (σ: 16.476481ms) 2025/04/30 10:35:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Parsed a coalesced packet. Part 2: 758 bytes. Remaining: 296 bytes. 2025/04/30 10:35:57 client <- Reading packet 1 (758 bytes) for connection (empty), Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, PacketNumber: 1, PacketNumberLen: 1, Length: 729, Version: v1} 2025/04/30 10:35:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:35:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8ace98c950cb4c4bdd8a253f1504e070b8bc03, InitialSourceConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (296 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client Dropping Initial keys. 2025/04/30 10:35:57 client -> Sending packet 1 (110 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:57 client Short Header{DestConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:57 client -> Sending packet 2 (86 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client -> Sending packet 3 (86 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: f799f78db02c365dc9c45e7a2e3012366d482d12, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5b4f0ad68167a184db9de0f2d947c0e896ebad24, StatelessResetToken: 0x37cc08bc187448cdfc18c58056e10bc9} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c1f13ae245bb01f0b552393eb5c1f279a2aaf9ea, StatelessResetToken: 0x9c9f7fc5f4a8434f0a5ea3e2d14ce392} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c705611c436cc4c526ee6b56a91df01c3a7d3d18, StatelessResetToken: 0x381ec77e107df9aabe264450dae14680} 2025/04/30 10:35:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:57 client Dropping Handshake keys. 2025/04/30 10:35:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:57 client -> Sending packet 2 (65 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 5b4f0ad68167a184db9de0f2d947c0e896ebad24, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 99.375µs} 2025/04/30 10:35:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client -> Sending packet 3 (60 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 5b4f0ad68167a184db9de0f2d947c0e896ebad24, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 160µs} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 3de5d946e215d746cb21e5955a4f26c4981eb502, StatelessResetToken: 0xf1588c8c259403137475167c09089745} 2025/04/30 10:35:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:57 client -> Sending packet 4 (42 bytes) for connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 5b4f0ad68167a184db9de0f2d947c0e896ebad24, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:57 client Connection 8ace98c950cb4c4bdd8a253f1504e070b8bc03 closed. 2025/04/30 10:35:57 Requesting https://server4:443/caffuubztb. 2025/04/30 10:35:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:57 Increased send buffer size to 14336 kiB 2025/04/30 10:35:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:57 Created qlog file: /logs/qlog/1bb4ad843dc57d27bd.sqlog 2025/04/30 10:35:57 client Starting new connection to server4 ([::]:57090 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1bb4ad843dc57d27bd, version v1 2025/04/30 10:35:57 Adding connection ID (empty). 2025/04/30 10:35:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:57 client -> Sending packet 0 (1280 bytes) for connection 1bb4ad843dc57d27bd, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: 1bb4ad843dc57d27bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:35:57 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:57 client -> Sending packet 1 (1280 bytes) for connection 1bb4ad843dc57d27bd, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: 1bb4ad843dc57d27bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:35:57 client -> Sending packet 2 (1280 bytes) for connection 1bb4ad843dc57d27bd, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: 1bb4ad843dc57d27bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 10:35:57 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:57 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:57 client Received first packet. Switching destination connection ID to: c32e2e85becdd595eb777fdd3d2ccd068fb1f812 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 360µs} 2025/04/30 10:35:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Parsed a coalesced packet. Part 2: 747 bytes. Remaining: 307 bytes. 2025/04/30 10:35:57 client <- Reading packet 1 (747 bytes) for connection (empty), Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, PacketNumber: 1, PacketNumberLen: 1, Length: 718, Version: v1} 2025/04/30 10:35:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 10:35:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1bb4ad843dc57d27bd, InitialSourceConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:57 client Dropping %!s(logging.PacketType=5) packet (307 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1bb4ad843dc57d27bd 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client Dropping Initial keys. 2025/04/30 10:35:57 client -> Sending packet 1 (52 bytes) for connection 1bb4ad843dc57d27bd, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:57 client -> Sending packet 0 (58 bytes) for connection 1bb4ad843dc57d27bd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:57 client -> Sending packet 2 (86 bytes) for connection 1bb4ad843dc57d27bd, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client -> Sending packet 3 (86 bytes) for connection 1bb4ad843dc57d27bd, Handshake 2025/04/30 10:35:57 client Long Header{Type: Handshake, DestConnectionID: c32e2e85becdd595eb777fdd3d2ccd068fb1f812, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:57 client <- Reading packet 2 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:57 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 54e09befd2fa2d3a92f792be9b640b58917261d5, StatelessResetToken: 0xf0c0ff50150c24aa50f1d475d32d9fa7} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dd2f8329d648dd440cb16ece9d0e95aa53e7dd67, StatelessResetToken: 0x33093ba27567e55fd7f37d12b365305d} 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b855fc862c17d9729d67b138981ec77a12bf5968, StatelessResetToken: 0x2294a04f0468f3bd301ce29a0fb9fd0d} 2025/04/30 10:35:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:57 client Dropping Handshake keys. 2025/04/30 10:35:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:57 client -> Sending packet 2 (65 bytes) for connection 1bb4ad843dc57d27bd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 54e09befd2fa2d3a92f792be9b640b58917261d5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 145.09µs} 2025/04/30 10:35:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client -> Sending packet 3 (60 bytes) for connection 1bb4ad843dc57d27bd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 54e09befd2fa2d3a92f792be9b640b58917261d5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:57 client -> Sending packet 4 (1315 bytes) for connection 1bb4ad843dc57d27bd, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 54e09befd2fa2d3a92f792be9b640b58917261d5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.PingFrame{} 2025/04/30 10:35:57 client <- Reading packet 3 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:57 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 40µs} 2025/04/30 10:35:57 client newly acked packets (1): [3] 2025/04/30 10:35:57 client updated RTT: 31.838684ms (σ: 15.919342ms) 2025/04/30 10:35:57 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:57 client Canceling loss detection timer. 2025/04/30 10:35:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: aa236eebe448238249de8e740e851d4a40b79169, StatelessResetToken: 0x7490c84b492b6662ceec84b86e9f26d8} 2025/04/30 10:35:57 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:57 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:57 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:57 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 48µs} 2025/04/30 10:35:57 client newly acked packets (1): [4] 2025/04/30 10:35:57 client updated RTT: 31.838ms (σ: 11.94ms) 2025/04/30 10:35:57 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:57 client -> Sending packet 5 (42 bytes) for connection 1bb4ad843dc57d27bd, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:57 client Short Header{DestConnectionID: 54e09befd2fa2d3a92f792be9b640b58917261d5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:57 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:57 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:57 client Connection 1bb4ad843dc57d27bd closed. 2025/04/30 10:35:57 Requesting https://server4:443/tzamuvmxgs. 2025/04/30 10:35:57 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:57 Increased send buffer size to 14336 kiB 2025/04/30 10:35:57 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:57 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:57 Created qlog file: /logs/qlog/baa68726ea1e06dddb22d67f233a.sqlog 2025/04/30 10:35:57 client Starting new connection to server4 ([::]:58098 -> 193.167.100.100:443), source connection ID (empty), destination connection ID baa68726ea1e06dddb22d67f233a, version v1 2025/04/30 10:35:57 Adding connection ID (empty). 2025/04/30 10:35:57 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:57 client -> Sending packet 0 (1280 bytes) for connection baa68726ea1e06dddb22d67f233a, Initial 2025/04/30 10:35:57 client Long Header{Type: Initial, DestConnectionID: baa68726ea1e06dddb22d67f233a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:35:58 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:58 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:58 client Received first packet. Switching destination connection ID to: 9dce5b66ee846d50901d428fcac656239369a148 2025/04/30 10:35:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:35:58 client newly acked packets (1): [0] 2025/04/30 10:35:58 client updated RTT: 33.104676ms (σ: 16.552338ms) 2025/04/30 10:35:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Parsed a coalesced packet. Part 2: 753 bytes. Remaining: 301 bytes. 2025/04/30 10:35:58 client <- Reading packet 1 (753 bytes) for connection (empty), Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, PacketNumber: 1, PacketNumberLen: 1, Length: 724, Version: v1} 2025/04/30 10:35:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:35:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: baa68726ea1e06dddb22d67f233a, InitialSourceConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:58 client Dropping %!s(logging.PacketType=5) packet (301 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection baa68726ea1e06dddb22d67f233a 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client Dropping Initial keys. 2025/04/30 10:35:58 client -> Sending packet 1 (52 bytes) for connection baa68726ea1e06dddb22d67f233a, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:58 client -> Sending packet 0 (58 bytes) for connection baa68726ea1e06dddb22d67f233a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:58 client -> Sending packet 2 (86 bytes) for connection baa68726ea1e06dddb22d67f233a, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client -> Sending packet 3 (86 bytes) for connection baa68726ea1e06dddb22d67f233a, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:58 client <- &wire.PingFrame{} 2025/04/30 10:35:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:58 client -> Sending packet 1 (44 bytes) for connection baa68726ea1e06dddb22d67f233a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 116.417µs} 2025/04/30 10:35:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:35:58 client -> Sending packet 4 (86 bytes) for connection baa68726ea1e06dddb22d67f233a, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client -> Sending packet 5 (86 bytes) for connection baa68726ea1e06dddb22d67f233a, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client <- Reading packet 4 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:58 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:58 client <- &wire.PingFrame{} 2025/04/30 10:35:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:58 client <- Reading packet 5 (22 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:58 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:58 client <- &wire.PingFrame{} 2025/04/30 10:35:58 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:35:58 client -> Sending packet 2 (44 bytes) for connection baa68726ea1e06dddb22d67f233a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 9dce5b66ee846d50901d428fcac656239369a148, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 70.211µs} 2025/04/30 10:35:58 client <- Reading packet 6 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:58 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 148ba25ffb88719cf233594ca77256a77f6ed6b6, StatelessResetToken: 0x63b3a843cbed4b0b9c7ebfc0828f23cc} 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 625841aea59d10d6f7a0d203e38861b8ddc31604, StatelessResetToken: 0x2829e40b9547d73a7ead9b55e7cd498f} 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 48d12ace6ea41a6a121ee141f56945a6febf880e, StatelessResetToken: 0xd7d22fae9db4d4bada24b3c8f091d02d} 2025/04/30 10:35:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:58 client Dropping Handshake keys. 2025/04/30 10:35:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:58 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:35:58 client -> Sending packet 4 (65 bytes) for connection baa68726ea1e06dddb22d67f233a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 148ba25ffb88719cf233594ca77256a77f6ed6b6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 129.291µs} 2025/04/30 10:35:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:58 client -> Sending packet 5 (60 bytes) for connection baa68726ea1e06dddb22d67f233a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 148ba25ffb88719cf233594ca77256a77f6ed6b6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:58 client <- Reading packet 7 (1094 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:58 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:58 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 200µs} 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 55525a263ed7d744ca6b30cf59c04fd965e5c688, StatelessResetToken: 0x1777d10e78f1ee1a06c29d95c3ff5809} 2025/04/30 10:35:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:35:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:58 client -> Sending packet 6 (42 bytes) for connection baa68726ea1e06dddb22d67f233a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 148ba25ffb88719cf233594ca77256a77f6ed6b6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:58 client Connection baa68726ea1e06dddb22d67f233a closed. 2025/04/30 10:35:58 Requesting https://server4:443/riydaychlo. 2025/04/30 10:35:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:58 Increased send buffer size to 14336 kiB 2025/04/30 10:35:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:58 Created qlog file: /logs/qlog/aa3cf1cd540052d42452e5dd5e78.sqlog 2025/04/30 10:35:58 client Starting new connection to server4 ([::]:47103 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aa3cf1cd540052d42452e5dd5e78, version v1 2025/04/30 10:35:58 Adding connection ID (empty). 2025/04/30 10:35:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:58 client -> Sending packet 0 (1280 bytes) for connection aa3cf1cd540052d42452e5dd5e78, Initial 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: aa3cf1cd540052d42452e5dd5e78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 10:35:58 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:35:58 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:35:58 client Received first packet. Switching destination connection ID to: c05429178a49c611e1e9690d8de1427f25283d06 2025/04/30 10:35:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/04/30 10:35:58 client newly acked packets (1): [0] 2025/04/30 10:35:58 client updated RTT: 33.063746ms (σ: 16.531873ms) 2025/04/30 10:35:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:35:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Parsed a coalesced packet. Part 2: 752 bytes. Remaining: 302 bytes. 2025/04/30 10:35:58 client <- Reading packet 1 (752 bytes) for connection (empty), Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, PacketNumber: 1, PacketNumberLen: 1, Length: 723, Version: v1} 2025/04/30 10:35:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:35:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:35:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aa3cf1cd540052d42452e5dd5e78, InitialSourceConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:35:58 client Dropping %!s(logging.PacketType=5) packet (302 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:35:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aa3cf1cd540052d42452e5dd5e78 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client Dropping Initial keys. 2025/04/30 10:35:58 client -> Sending packet 1 (52 bytes) for connection aa3cf1cd540052d42452e5dd5e78, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:35:58 client -> Sending packet 0 (58 bytes) for connection aa3cf1cd540052d42452e5dd5e78, 1-RTT (ECN: ECT(0)) 2025/04/30 10:35:58 client Short Header{DestConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:35:58 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:35:58 client -> Sending packet 2 (86 bytes) for connection aa3cf1cd540052d42452e5dd5e78, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client -> Sending packet 3 (86 bytes) for connection aa3cf1cd540052d42452e5dd5e78, Handshake 2025/04/30 10:35:58 client Long Header{Type: Handshake, DestConnectionID: c05429178a49c611e1e9690d8de1427f25283d06, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:35:58 client <- Reading packet 3 (1174 bytes) for connection (empty), 1-RTT 2025/04/30 10:35:58 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:35:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 127.504ms} 2025/04/30 10:35:58 client Peer doesn't await address validation any longer. 2025/04/30 10:35:58 client newly acked packets (1): [0] 2025/04/30 10:35:58 client updated RTT: 45.85ms (σ: 37.972ms) 2025/04/30 10:35:58 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:35:58 client Canceling loss detection timer. 2025/04/30 10:35:58 client Dropping Handshake keys. 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 77dc9487d8073f5c3982826458710e7659a5a19a, StatelessResetToken: 0xa942fb3f398f9f2861a22b834fb4b36e} 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a98ece964f622ea23bd326caea7c91a9e0044b44, StatelessResetToken: 0x7d03abe4bfea8efb911e8250812386d6} 2025/04/30 10:35:58 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dda633dd91142121e937076cda4ac5a7298b5825, StatelessResetToken: 0xa1699fd978154153f9fd9004e8de5fa7} 2025/04/30 10:35:58 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:35:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:35:58 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:35:58 client -> Sending packet 1 (46 bytes) for connection aa3cf1cd540052d42452e5dd5e78, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 77dc9487d8073f5c3982826458710e7659a5a19a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 153.616µs} 2025/04/30 10:35:58 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:35:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:35:58 client -> Sending packet 2 (42 bytes) for connection aa3cf1cd540052d42452e5dd5e78, 1-RTT (ECN: Not-ECT) 2025/04/30 10:35:58 client Short Header{DestConnectionID: 77dc9487d8073f5c3982826458710e7659a5a19a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:35:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:35:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:35:58 client Connection aa3cf1cd540052d42452e5dd5e78 closed. 2025/04/30 10:35:58 Requesting https://server4:443/ddziyxcqqx. 2025/04/30 10:35:58 Increased receive buffer size to 14336 kiB 2025/04/30 10:35:58 Increased send buffer size to 14336 kiB 2025/04/30 10:35:58 Setting DF for IPv4 and IPv6. 2025/04/30 10:35:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:35:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:35:58 Created qlog file: /logs/qlog/7e2cf5aca827e9f7d8a2a07f.sqlog 2025/04/30 10:35:58 client Starting new connection to server4 ([::]:46173 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7e2cf5aca827e9f7d8a2a07f, version v1 2025/04/30 10:35:58 Adding connection ID (empty). 2025/04/30 10:35:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:35:58 client -> Sending packet 0 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: 7e2cf5aca827e9f7d8a2a07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:35:58 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:35:58 client -> Sending packet 1 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: 7e2cf5aca827e9f7d8a2a07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:35:58 client -> Sending packet 2 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:35:58 client Long Header{Type: Initial, DestConnectionID: 7e2cf5aca827e9f7d8a2a07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:35:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 10:35:59 client -> Sending packet 3 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:35:59 client Long Header{Type: Initial, DestConnectionID: 7e2cf5aca827e9f7d8a2a07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:35:59 client -> Sending packet 4 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:35:59 client Long Header{Type: Initial, DestConnectionID: 7e2cf5aca827e9f7d8a2a07f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:35:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:35:59 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:35:59 client <- Reading packet 2 (52 bytes) for connection (empty), Initial 2025/04/30 10:35:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:35:59 client Received first packet. Switching destination connection ID to: 518519f3a2572c86197b9ac98b47038d6485302b 2025/04/30 10:35:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 88µs} 2025/04/30 10:35:59 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:36:00 client -> Sending packet 5 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:36:00 client Long Header{Type: Initial, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:36:00 client -> Sending packet 6 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:36:00 client Long Header{Type: Initial, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 10:36:00 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:36:00 client <- Reading packet 6 (52 bytes) for connection (empty), Initial 2025/04/30 10:36:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:36:00 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 48µs} 2025/04/30 10:36:00 client newly acked packets (1): [6] 2025/04/30 10:36:00 client updated RTT: 33.962092ms (σ: 16.981046ms) 2025/04/30 10:36:00 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:00 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:00 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:36:00 client -> Sending packet 7 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:36:00 client Long Header{Type: Initial, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:00 client -> &wire.PingFrame{} 2025/04/30 10:36:00 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 10:36:00 client <- Reading packet 9 (52 bytes) for connection (empty), Initial 2025/04/30 10:36:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:36:00 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, DelayTime: 88µs} 2025/04/30 10:36:00 client newly acked packets (1): [7] 2025/04/30 10:36:00 client updated RTT: 33.851ms (σ: 12.957ms) 2025/04/30 10:36:00 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:02 client -> Sending packet 8 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:36:02 client Long Header{Type: Initial, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:02 client -> &wire.PingFrame{} 2025/04/30 10:36:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:02 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:02 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:03 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 10:36:03 client <- Reading packet 11 (149 bytes) for connection (empty), Initial 2025/04/30 10:36:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 10:36:03 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, DelayTime: 1.544008s} 2025/04/30 10:36:03 client newly acked packets (1): [8] 2025/04/30 10:36:03 client updated RTT: 226.743ms (σ: 395.503ms) 2025/04/30 10:36:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:36:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:03 client Queueing packet (1051 bytes) for later decryption 2025/04/30 10:36:03 client -> Sending packet 9 (1280 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Initial 2025/04/30 10:36:03 client Long Header{Type: Initial, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:03 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:36:03 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:03 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:03 client <- Reading packet 8 (50 bytes) for connection (empty), Handshake 2025/04/30 10:36:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, PacketNumber: 8, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 10:36:03 client <- &wire.PingFrame{} 2025/04/30 10:36:03 client Queueing packet (1148 bytes) for later decryption 2025/04/30 10:36:03 client -> Sending packet 0 (52 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Handshake 2025/04/30 10:36:03 client Long Header{Type: Handshake, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:36:03 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 0s} 2025/04/30 10:36:03 client Dropping Initial keys. 2025/04/30 10:36:03 client Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 10:36:03 client Dropping %!s(logging.PacketType=0) packet (56 bytes) because we already dropped the keys. 2025/04/30 10:36:03 client Queueing packet (1144 bytes) for later decryption 2025/04/30 10:36:03 client <- Reading packet 13 (750 bytes) for connection (empty), Handshake 2025/04/30 10:36:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, PacketNumber: 13, PacketNumberLen: 1, Length: 721, Version: v1} 2025/04/30 10:36:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:36:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:36:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7e2cf5aca827e9f7d8a2a07f, InitialSourceConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:36:03 client -> Sending packet 1 (93 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Handshake 2025/04/30 10:36:03 client Long Header{Type: Handshake, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 64, Version: v1} 2025/04/30 10:36:03 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 8, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 8, Smallest: 8}}, DelayTime: 0s} 2025/04/30 10:36:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:03 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:03 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:03 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:03 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:03 client Dropping %!s(logging.PacketType=5) packet (1144 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:36:03 client -> Sending packet 0 (58 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:03 client Short Header{DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:04 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:36:05 client -> Sending packet 2 (86 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Handshake 2025/04/30 10:36:05 client Long Header{Type: Handshake, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:05 client -> Sending packet 3 (86 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, Handshake 2025/04/30 10:36:05 client Long Header{Type: Handshake, DestConnectionID: 518519f3a2572c86197b9ac98b47038d6485302b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:36:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:36:05 client <- Reading packet 14 (139 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:05 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c55f94f19a3a8b16f5dcdd7e3957cef035109da5, StatelessResetToken: 0xecf6677269038d467e0ff9747b9258df} 2025/04/30 10:36:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b70665873480a7eb4a08f1bd7930d8b2642a9c4, StatelessResetToken: 0xb289672a96de56cb14e99a8dffa97233} 2025/04/30 10:36:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e868d8e0ba5cf705a9eb9a778dbb69404d0e465, StatelessResetToken: 0x9bdecb033c5fc165e45443bc67ade6d5} 2025/04/30 10:36:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:36:05 client Dropping Handshake keys. 2025/04/30 10:36:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:36:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:36:05 client -> Sending packet 2 (65 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:05 client Short Header{DestConnectionID: c55f94f19a3a8b16f5dcdd7e3957cef035109da5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:05 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 117.649µs} 2025/04/30 10:36:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:05 client -> Sending packet 3 (60 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:36:05 client Short Header{DestConnectionID: c55f94f19a3a8b16f5dcdd7e3957cef035109da5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:36:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:36:05 client <- Reading packet 15 (1092 bytes) for connection (empty), 1-RTT 2025/04/30 10:36:05 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:36:05 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 160µs} 2025/04/30 10:36:05 client newly acked packets (1): [3] 2025/04/30 10:36:05 client updated RTT: 202.376ms (σ: 345.361ms) 2025/04/30 10:36:05 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:36:05 client Canceling loss detection timer. 2025/04/30 10:36:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 33565cfe38fe4738df8faf73d2e1a32363bac6d2, StatelessResetToken: 0x532ea868b2fa0bbc40adacf4cbb6a36a} 2025/04/30 10:36:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:36:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:36:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:36:05 client -> Sending packet 4 (42 bytes) for connection 7e2cf5aca827e9f7d8a2a07f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:36:05 client Short Header{DestConnectionID: c55f94f19a3a8b16f5dcdd7e3957cef035109da5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:36:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:36:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:36:05 client Connection 7e2cf5aca827e9f7d8a2a07f closed. 2025/04/30 10:36:05 Requesting https://server4:443/nvvjbhuiur. 2025/04/30 10:36:05 Increased receive buffer size to 14336 kiB 2025/04/30 10:36:05 Increased send buffer size to 14336 kiB 2025/04/30 10:36:05 Setting DF for IPv4 and IPv6. 2025/04/30 10:36:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:36:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:36:05 Created qlog file: /logs/qlog/3e7510a5f2ffe98a0b51.sqlog 2025/04/30 10:36:05 client Starting new connection to server4 ([::]:51414 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3e7510a5f2ffe98a0b51, version v1 2025/04/30 10:36:05 Adding connection ID (empty). 2025/04/30 10:36:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:36:05 client -> Sending packet 0 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:05 client Long Header{Type: Initial, DestConnectionID: 3e7510a5f2ffe98a0b51, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:36:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:36:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:36:06 client -> Sending packet 1 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: 3e7510a5f2ffe98a0b51, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:36:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:36:06 client -> Sending packet 2 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: 3e7510a5f2ffe98a0b51, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:36:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 10:36:06 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:06 client <- Reading packet 2 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:06 client Received first packet. Switching destination connection ID to: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223 2025/04/30 10:36:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 10:36:06 client newly acked packets (1): [2] 2025/04/30 10:36:06 client updated RTT: 33.78371ms (σ: 16.891855ms) 2025/04/30 10:36:06 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:06 client -> Sending packet 3 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:06 client -> &wire.PingFrame{} 2025/04/30 10:36:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 10:36:06 client -> Sending packet 4 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:06 client -> &wire.PingFrame{} 2025/04/30 10:36:06 client -> Sending packet 5 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:06 client -> &wire.PingFrame{} 2025/04/30 10:36:06 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:06 client <- Reading packet 5 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:06 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 10:36:06 client newly acked packets (1): [5] 2025/04/30 10:36:06 client updated RTT: 33.78ms (σ: 12.673ms) 2025/04/30 10:36:06 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:07 client -> Sending packet 6 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:07 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:07 client -> &wire.PingFrame{} 2025/04/30 10:36:07 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:07 client Queueing packet (749 bytes) for later decryption 2025/04/30 10:36:07 client Queueing packet (50 bytes) for later decryption 2025/04/30 10:36:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 5 2025/04/30 10:36:08 client -> Sending packet 7 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:08 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:08 client -> &wire.PingFrame{} 2025/04/30 10:36:08 client -> Sending packet 8 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:08 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:08 client -> &wire.PingFrame{} 2025/04/30 10:36:08 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:08 client <- Reading packet 10 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:08 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 10:36:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:08 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:08 client <- Reading packet 11 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, Token: (empty), PacketNumber: 11, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:08 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 10:36:08 client newly acked packets (1): [8] 2025/04/30 10:36:08 client updated RTT: 33.795ms (σ: 9.536ms) 2025/04/30 10:36:08 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:09 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 10:36:11 client -> Sending packet 9 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:11 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:11 client -> &wire.PingFrame{} 2025/04/30 10:36:11 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:13 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 7 2025/04/30 10:36:15 client -> Sending packet 10 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:15 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:15 client -> &wire.PingFrame{} 2025/04/30 10:36:15 client -> Sending packet 11 (1280 bytes) for connection 3e7510a5f2ffe98a0b51, Initial 2025/04/30 10:36:15 client Long Header{Type: Initial, DestConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 10:36:15 client -> &wire.PingFrame{} 2025/04/30 10:36:15 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:15 client <- Reading packet 15 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, Token: (empty), PacketNumber: 15, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:15 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 160µs} 2025/04/30 10:36:15 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:15 client Parsed a coalesced packet. Part 1: 54 bytes. Remaining: 1146 bytes. 2025/04/30 10:36:15 client <- Reading packet 16 (54 bytes) for connection (empty), Initial 2025/04/30 10:36:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9da72e66d191cbb4774bc3ebdd4282ad2f18d223, Token: (empty), PacketNumber: 16, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:36:15 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 10:36:15 client newly acked packets (1): [11] 2025/04/30 10:36:15 client updated RTT: 33.826ms (σ: 7.214ms) 2025/04/30 10:36:15 client Queueing packet (1146 bytes) for later decryption 2025/04/30 10:36:15 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 10:36:15 client Destroying connection: timeout: handshake did not complete in time 2025/04/30 10:36:15 Removing connection ID (empty). 2025/04/30 10:36:15 client Connection 3e7510a5f2ffe98a0b51 closed.