2025/04/30 10:32:46 Requesting https://server4:443/usjcuwtokq. 2025/04/30 10:32:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:32:46 Increased send buffer size to 14336 kiB 2025/04/30 10:32:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:32:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:32:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:32:46 Created qlog file: /logs/qlog/4c5f19114236e68e3777.sqlog 2025/04/30 10:32:46 client Starting new connection to server4 ([::]:38465 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4c5f19114236e68e3777, version v1 2025/04/30 10:32:46 Adding connection ID (empty). 2025/04/30 10:32:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:32:46 client -> Sending packet 0 (1280 bytes) for connection 4c5f19114236e68e3777, Initial 2025/04/30 10:32:46 client Long Header{Type: Initial, DestConnectionID: 4c5f19114236e68e3777, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 10:32:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 10:32:46 client Parsed a coalesced packet. Part 1: 146 bytes. Remaining: 1054 bytes. 2025/04/30 10:32:46 client <- Reading packet 0 (146 bytes) for connection (empty), Initial 2025/04/30 10:32:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dafab94ef8f0913ec3999204595b758552438294, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 10:32:46 client Received first packet. Switching destination connection ID to: dafab94ef8f0913ec3999204595b758552438294 2025/04/30 10:32:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 10:32:46 client newly acked packets (1): [0] 2025/04/30 10:32:46 client updated RTT: 38.210849ms (σ: 19.105424ms) 2025/04/30 10:32:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 10:32:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Parsed a coalesced packet. Part 2: 751 bytes. Remaining: 303 bytes. 2025/04/30 10:32:46 client <- Reading packet 1 (751 bytes) for connection (empty), Handshake 2025/04/30 10:32:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dafab94ef8f0913ec3999204595b758552438294, PacketNumber: 1, PacketNumberLen: 1, Length: 722, Version: v1} 2025/04/30 10:32:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:32:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4c5f19114236e68e3777, InitialSourceConnectionID: dafab94ef8f0913ec3999204595b758552438294, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:32:46 client Dropping %!s(logging.PacketType=5) packet (303 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:32:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4c5f19114236e68e3777 2025/04/30 10:32:46 client Long Header{Type: Initial, DestConnectionID: dafab94ef8f0913ec3999204595b758552438294, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:32:46 client Long Header{Type: Handshake, DestConnectionID: dafab94ef8f0913ec3999204595b758552438294, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:32:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:32:46 client Dropping Initial keys. 2025/04/30 10:32:46 client -> Sending packet 1 (110 bytes) for connection 4c5f19114236e68e3777, Handshake 2025/04/30 10:32:46 client Long Header{Type: Handshake, DestConnectionID: dafab94ef8f0913ec3999204595b758552438294, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:32:46 client Short Header{DestConnectionID: dafab94ef8f0913ec3999204595b758552438294, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:32:46 client <- Reading packet 2 (539 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e1b5ca8a71cab56ed441e7cb977ead13ffc4a6b3, StatelessResetToken: 0x98fbef1bb68b555b5078727c21a7a1f7} 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fb96c8467ad31526181348123f774bd21caf19a, StatelessResetToken: 0xf6b6497395fa273b3e6294d8fad4d187} 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d7655a9ecc24b2bce088594d111cde8060e818c, StatelessResetToken: 0x34b8c3f5745186913bf02fff3916efe9} 2025/04/30 10:32:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:32:46 client Dropping Handshake keys. 2025/04/30 10:32:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 396, Offset + Data length: 396} 2025/04/30 10:32:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:32:46 client -> Sending packet 1 (46 bytes) for connection 4c5f19114236e68e3777, 1-RTT (ECN: ECT(0)) 2025/04/30 10:32:46 client Short Header{DestConnectionID: e1b5ca8a71cab56ed441e7cb977ead13ffc4a6b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 131.445µs} 2025/04/30 10:32:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:32:46 client <- Reading packet 3 (63 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 56µs} 2025/04/30 10:32:46 client newly acked packets (1): [1] 2025/04/30 10:32:46 client updated RTT: 37.275ms (σ: 16.197ms) 2025/04/30 10:32:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:32:46 client lost packet 0 (time threshold) 2025/04/30 10:32:46 client Canceling loss detection timer. 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 079a8d59db204c2cb3a6781d33866d8de1996cf0, StatelessResetToken: 0xb85f88ca1e6c81e9a3ef2cb03e7718a5} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client Ignoring all packets below 3. 2025/04/30 10:32:46 client -> Sending packet 2 (63 bytes) for connection 4c5f19114236e68e3777, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: e1b5ca8a71cab56ed441e7cb977ead13ffc4a6b3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 144.81µs} 2025/04/30 10:32:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:32:46 client <- Reading packet 4 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 120µs} 2025/04/30 10:32:46 client newly acked packets (1): [2] 2025/04/30 10:32:46 client updated RTT: 36.606ms (σ: 13.485ms) 2025/04/30 10:32:46 client Canceling loss detection timer. 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1322, Offset + Data length: 1322} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client Ignoring all packets below 4. 2025/04/30 10:32:46 client <- Reading packet 5 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1322, Data length: 1326, Offset + Data length: 2648} 2025/04/30 10:32:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:32:46 client -> Sending packet 3 (44 bytes) for connection 4c5f19114236e68e3777, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: e1b5ca8a71cab56ed441e7cb977ead13ffc4a6b3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 48.881µs} 2025/04/30 10:32:46 client <- Reading packet 6 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2648, Data length: 1326, Offset + Data length: 3974} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client <- Reading packet 7 (1170 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 3974, Data length: 1146, Offset + Data length: 5120} 2025/04/30 10:32:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:32:46 client -> Sending packet 4 (44 bytes) for connection 4c5f19114236e68e3777, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: e1b5ca8a71cab56ed441e7cb977ead13ffc4a6b3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 45.685µs} 2025/04/30 10:32:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:32:46 client -> Sending packet 5 (42 bytes) for connection 4c5f19114236e68e3777, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: e1b5ca8a71cab56ed441e7cb977ead13ffc4a6b3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:32:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:32:46 client Connection 4c5f19114236e68e3777 closed. 2025/04/30 10:32:46 Requesting https://server4:443/wzuysylzdw. 2025/04/30 10:32:46 Increased receive buffer size to 14336 kiB 2025/04/30 10:32:46 Increased send buffer size to 14336 kiB 2025/04/30 10:32:46 Setting DF for IPv4 and IPv6. 2025/04/30 10:32:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:32:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:32:46 Created qlog file: /logs/qlog/d62738cfe09c177f4466251058.sqlog 2025/04/30 10:32:46 client Starting new connection to server4 ([::]:58948 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d62738cfe09c177f4466251058, version v1 2025/04/30 10:32:46 Adding connection ID (empty). 2025/04/30 10:32:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 10:32:46 client -> Sending packet 0 (1280 bytes) for connection d62738cfe09c177f4466251058, Initial 2025/04/30 10:32:46 client Long Header{Type: Initial, DestConnectionID: d62738cfe09c177f4466251058, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 10:32:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 499, Offset + Data length: 499} 2025/04/30 10:32:46 client Parsed a coalesced packet. Part 1: 152 bytes. Remaining: 1048 bytes. 2025/04/30 10:32:46 client <- Reading packet 0 (152 bytes) for connection (empty), Initial 2025/04/30 10:32:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 122, Version: v1} 2025/04/30 10:32:46 client Received first packet. Switching destination connection ID to: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3 2025/04/30 10:32:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 10:32:46 client newly acked packets (1): [0] 2025/04/30 10:32:46 client updated RTT: 32.991428ms (σ: 16.495714ms) 2025/04/30 10:32:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 10:32:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Parsed a coalesced packet. Part 2: 203 bytes. Remaining: 845 bytes. 2025/04/30 10:32:46 client <- Reading packet 1 (203 bytes) for connection (empty), Handshake 2025/04/30 10:32:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, PacketNumber: 1, PacketNumberLen: 1, Length: 174, Version: v1} 2025/04/30 10:32:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 10:32:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:32:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d62738cfe09c177f4466251058, InitialSourceConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 10:32:46 client Dropping %!s(logging.PacketType=5) packet (845 bytes) for which we couldn't unpack the header. Error: not a QUIC packet 2025/04/30 10:32:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d62738cfe09c177f4466251058 2025/04/30 10:32:46 client Long Header{Type: Initial, DestConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1164, Version: v1} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:32:46 client Long Header{Type: Handshake, DestConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 10:32:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:32:46 client Dropping Initial keys. 2025/04/30 10:32:46 client -> Sending packet 1 (52 bytes) for connection d62738cfe09c177f4466251058, Handshake 2025/04/30 10:32:46 client Long Header{Type: Handshake, DestConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:32:46 client -> Sending packet 0 (58 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: ECT(0)) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 3497fdbbb7aa20e64922e8d08f87dc43c3ced6f3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:32:46 client <- Reading packet 2 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 10:32:46 client Peer doesn't await address validation any longer. 2025/04/30 10:32:46 client newly acked packets (1): [0] 2025/04/30 10:32:46 client updated RTT: 33.012ms (σ: 12.414ms) 2025/04/30 10:32:46 client Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:32:46 client Canceling loss detection timer. 2025/04/30 10:32:46 client Dropping Handshake keys. 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, StatelessResetToken: 0x6fe1c04afc9835be8d6b37b2e293bca9} 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fb509452e3fd710cc9aa19f4f8844c1508ac3b11, StatelessResetToken: 0x12c695651830ef1501c9fdc5bf53b118} 2025/04/30 10:32:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c82f89288016a45092835636c3ce751c87dd9244, StatelessResetToken: 0x954d90690b0759fbfc210f7a8743cc00} 2025/04/30 10:32:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 10:32:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 396, Offset + Data length: 396} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 801, Offset + Data length: 801} 2025/04/30 10:32:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:32:46 client -> Sending packet 1 (46 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 207.707µs} 2025/04/30 10:32:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 10:32:46 client <- Reading packet 3 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 801, Data length: 1326, Offset + Data length: 2127} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client <- Reading packet 4 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2127, Data length: 1326, Offset + Data length: 3453} 2025/04/30 10:32:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:32:46 client -> Sending packet 2 (44 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 39.083µs} 2025/04/30 10:32:46 client <- Reading packet 5 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3453, Data length: 1326, Offset + Data length: 4779} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client <- Reading packet 6 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4779, Data length: 1326, Offset + Data length: 6105} 2025/04/30 10:32:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:32:46 client -> Sending packet 3 (44 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 43.872µs} 2025/04/30 10:32:46 client <- Reading packet 7 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 6105, Data length: 1326, Offset + Data length: 7431} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client <- Reading packet 8 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7431, Data length: 1326, Offset + Data length: 8757} 2025/04/30 10:32:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:32:46 client -> Sending packet 4 (44 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, DelayTime: 51.526µs} 2025/04/30 10:32:46 client <- Reading packet 9 (1350 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 8757, Data length: 1326, Offset + Data length: 10083} 2025/04/30 10:32:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 10:32:46 client <- Reading packet 10 (181 bytes) for connection (empty), 1-RTT 2025/04/30 10:32:46 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:32:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 10083, Data length: 157, Offset + Data length: 10240} 2025/04/30 10:32:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 10:32:46 client -> Sending packet 5 (44 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, DelayTime: 46.096µs} 2025/04/30 10:32:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 10:32:46 client -> Sending packet 6 (42 bytes) for connection d62738cfe09c177f4466251058, 1-RTT (ECN: Not-ECT) 2025/04/30 10:32:46 client Short Header{DestConnectionID: 9c2add29f2aea53a61a24b2759241e02921db31f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:32:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:32:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 10:32:46 client Connection d62738cfe09c177f4466251058 closed.