2025/04/30 18:55:17 Requesting https://server4:443/gnjymvbigx. 2025/04/30 18:55:17 Increased receive buffer size to 14336 kiB 2025/04/30 18:55:17 Increased send buffer size to 14336 kiB 2025/04/30 18:55:17 Setting DF for IPv4 and IPv6. 2025/04/30 18:55:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 18:55:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 18:55:17 Created qlog file: /logs/qlog/d8a6ca05e01bfb50918cc320a08f045ccc.sqlog 2025/04/30 18:55:17 client Starting new connection to server4 ([::]:51721 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8a6ca05e01bfb50918cc320a08f045ccc, version v1 2025/04/30 18:55:17 Adding connection ID (empty). 2025/04/30 18:55:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 18:55:17 client -> Sending packet 0 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:17 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 18:55:17 client -> Sending packet 1 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:17 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:17 client -> Sending packet 2 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:17 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 18:55:17 client -> Sending packet 3 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:17 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:17 client -> Sending packet 4 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:17 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 18:55:18 client -> Sending packet 5 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:18 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:18 client -> Sending packet 6 (1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Initial 2025/04/30 18:55:18 client Long Header{Type: Initial, DestConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 18:55:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 18:55:18 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 18:55:18 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 18:55:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 18:55:18 client Received first packet. Switching destination connection ID to: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4 2025/04/30 18:55:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 18:55:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 18:55:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 18:55:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 18:55:18 client Parsed a coalesced packet. Part 2: 757 bytes. Remaining: 297 bytes. 2025/04/30 18:55:18 client <- Reading packet 1 (757 bytes) for connection (empty), Handshake 2025/04/30 18:55:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, PacketNumber: 1, PacketNumberLen: 1, Length: 728, Version: v1} 2025/04/30 18:55:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 18:55:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 18:55:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 18:55:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8a6ca05e01bfb50918cc320a08f045ccc, InitialSourceConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 18:55:18 client Dropping %!s(logging.PacketType=5) packet (297 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc 2025/04/30 18:55:18 client Long Header{Type: Initial, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 18:55:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 18:55:18 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:18 client Dropping Initial keys. 2025/04/30 18:55:18 client -> Sending packet 1 (52 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:18 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 18:55:18 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 18:55:18 client -> Sending packet 0 (58 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, 1-RTT (ECN: ECT(0)) 2025/04/30 18:55:18 client Short Header{DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 18:55:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 18:55:18 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 18:55:18 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 18:55:18 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:18 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 18:55:18 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 18:55:18 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 18:55:18 client -> Sending packet 2 (86 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:18 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:18 client -> Sending packet 3 (86 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:18 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:19 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 18:55:19 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 18:55:19 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 18:55:19 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:19 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 18:55:19 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 18:55:19 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 18:55:19 client -> Sending packet 4 (86 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:19 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:19 client -> Sending packet 5 (86 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:19 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:19 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 18:55:19 client Dropping %!s(logging.PacketType=0) packet (149 bytes) because we already dropped the keys. 2025/04/30 18:55:19 client Dropping %!s(logging.PacketType=5) packet (1051 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:20 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 18:55:20 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 18:55:20 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:20 client Parsed a coalesced packet. Part 1: 52 bytes. Remaining: 1148 bytes. 2025/04/30 18:55:20 client Dropping %!s(logging.PacketType=0) packet (52 bytes) because we already dropped the keys. 2025/04/30 18:55:20 client Dropping %!s(logging.PacketType=5) packet (1148 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 18:55:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 18:55:20 client -> Sending packet 6 (86 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:20 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:20 client -> Sending packet 7 (86 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, Handshake 2025/04/30 18:55:20 client Long Header{Type: Handshake, DestConnectionID: 56b6734a6f67b13d4c076bedcb4e3e7ab908b6b4, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 18:55:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 18:55:20 client <- Reading packet 9 (1173 bytes) for connection (empty), 1-RTT 2025/04/30 18:55:20 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 18:55:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 18:55:20 client Peer doesn't await address validation any longer. 2025/04/30 18:55:20 client newly acked packets (1): [0] 2025/04/30 18:55:20 client updated RTT: 1.503280786s (σ: 751.640393ms) 2025/04/30 18:55:20 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 18:55:20 client Canceling loss detection timer. 2025/04/30 18:55:20 client Dropping Handshake keys. 2025/04/30 18:55:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b71f2a83fbd585b399873b9d8fcf775411a5d82, StatelessResetToken: 0x05a8239e813d2d8d86fbcec2354ff2dd} 2025/04/30 18:55:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1f0e7cfd4c15e570fb5a0f8a43a643c35171d7ab, StatelessResetToken: 0x96d34e796f09478f2bfd65a41e3c7721} 2025/04/30 18:55:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3c8521b01860929e62962c127554036fe0c88277, StatelessResetToken: 0x3506f6a8a45f87bae28ca85bc0bb4e49} 2025/04/30 18:55:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 18:55:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 18:55:20 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 18:55:20 client -> Sending packet 1 (46 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, 1-RTT (ECN: Not-ECT) 2025/04/30 18:55:20 client Short Header{DestConnectionID: 0b71f2a83fbd585b399873b9d8fcf775411a5d82, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 18:55:20 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 200.808µs} 2025/04/30 18:55:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 18:55:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 18:55:20 client -> Sending packet 2 (42 bytes) for connection d8a6ca05e01bfb50918cc320a08f045ccc, 1-RTT (ECN: Not-ECT) 2025/04/30 18:55:20 client Short Header{DestConnectionID: 0b71f2a83fbd585b399873b9d8fcf775411a5d82, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 18:55:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 18:55:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 18:55:20 client Connection d8a6ca05e01bfb50918cc320a08f045ccc closed.