2025/04/30 12:17:03 Requesting https://server4:443/otklktyquk. 2025/04/30 12:17:03 Increased receive buffer size to 14336 kiB 2025/04/30 12:17:03 Increased send buffer size to 14336 kiB 2025/04/30 12:17:03 Setting DF for IPv4 and IPv6. 2025/04/30 12:17:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:17:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:17:03 Created qlog file: /logs/qlog/754086ed2144099f8a084c1d0e.sqlog 2025/04/30 12:17:03 client Starting new connection to server4 ([::]:43594 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 754086ed2144099f8a084c1d0e, version v1 2025/04/30 12:17:03 Adding connection ID (empty). 2025/04/30 12:17:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:17:03 client -> Sending packet 0 (1280 bytes) for connection 754086ed2144099f8a084c1d0e, Initial 2025/04/30 12:17:03 client Long Header{Type: Initial, DestConnectionID: 754086ed2144099f8a084c1d0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:17:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:17:03 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1318 bytes. 2025/04/30 12:17:03 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:17:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:17:03 client Received first packet. Switching destination connection ID to: ff2e0d3dd5b3ea3f 2025/04/30 12:17:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 456µs} 2025/04/30 12:17:03 client newly acked packets (1): [0] 2025/04/30 12:17:03 client updated RTT: 38.334474ms (σ: 19.167237ms) 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:17:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:17:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:17:03 client Parsed a coalesced packet. Part 2: 1318 bytes. Remaining: 0 bytes. 2025/04/30 12:17:03 client <- Reading packet 0 (1318 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 0, PacketNumberLen: 1, Length: 1301, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 1280, Offset + Data length: 1280} 2025/04/30 12:17:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 754086ed2144099f8a084c1d0e, InitialSourceConnectionID: ff2e0d3dd5b3ea3f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xd3e7a4c10241249a4cdf0dc3270812ca, MaxDatagramFrameSize: 65535} 2025/04/30 12:17:03 client -> Sending packet 1 (1280 bytes) for connection 754086ed2144099f8a084c1d0e, Initial 2025/04/30 12:17:03 client Long Header{Type: Initial, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client -> Sending packet 0 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client Dropping Initial keys. 2025/04/30 12:17:03 client <- Reading packet 1 (1452 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 1, PacketNumberLen: 1, Length: 1435, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 1280, Data length: 1413, Offset + Data length: 2693} 2025/04/30 12:17:03 client -> Sending packet 1 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client <- Reading packet 2 (1452 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 2, PacketNumberLen: 1, Length: 1435, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 2693, Data length: 1413, Offset + Data length: 4106} 2025/04/30 12:17:03 client -> Sending packet 2 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client -> Sending packet 3 (37 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 12:17:03 client -> &wire.PingFrame{} 2025/04/30 12:17:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:17:03 client -> Sending packet 4 (37 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 12:17:03 client -> &wire.PingFrame{} 2025/04/30 12:17:03 client -> Sending packet 5 (37 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 12:17:03 client -> &wire.PingFrame{} 2025/04/30 12:17:03 client <- Reading packet 3 (1452 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 3, PacketNumberLen: 1, Length: 1435, Version: v1} 2025/04/30 12:17:03 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 56µs} 2025/04/30 12:17:03 client Peer doesn't await address validation any longer. 2025/04/30 12:17:03 client newly acked packets (1): [5] 2025/04/30 12:17:03 client updated RTT: 37.538ms (σ: 15.966ms) 2025/04/30 12:17:03 client Canceling loss detection timer. 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 4106, Data length: 1408, Offset + Data length: 5514} 2025/04/30 12:17:03 client -> Sending packet 6 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client <- Reading packet 4 (1452 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 4, PacketNumberLen: 1, Length: 1435, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 5514, Data length: 1413, Offset + Data length: 6927} 2025/04/30 12:17:03 client -> Sending packet 7 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client <- Reading packet 5 (1452 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 5, PacketNumberLen: 1, Length: 1435, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 6927, Data length: 1413, Offset + Data length: 8340} 2025/04/30 12:17:03 client -> Sending packet 8 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client <- Reading packet 6 (1452 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 6, PacketNumberLen: 1, Length: 1435, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 8340, Data length: 1413, Offset + Data length: 9753} 2025/04/30 12:17:03 client -> Sending packet 9 (43 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: ff2e0d3dd5b3ea3f, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client Parsed a coalesced packet. Part 1: 264 bytes. Remaining: 102 bytes. 2025/04/30 12:17:03 client <- Reading packet 7 (264 bytes) for connection (empty), Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2e0d3dd5b3ea3f, PacketNumber: 7, PacketNumberLen: 1, Length: 247, Version: v1} 2025/04/30 12:17:03 client <- &wire.CryptoFrame{Offset: 9753, Data length: 225, Offset + Data length: 9978} 2025/04/30 12:17:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:17:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:17:03 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a668666b78c20e2, StatelessResetToken: 0x94011b25c19615fd926d7a7c6616ba0a} 2025/04/30 12:17:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e920b9e625f25f3, StatelessResetToken: 0x1a65573023346077ae01d83a226d0d69} 2025/04/30 12:17:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b4a7a18c68d741a, StatelessResetToken: 0xdd2b6a2069c5e0cb9a03512b06231928} 2025/04/30 12:17:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:17:03 client -> Sending packet 10 (111 bytes) for connection 754086ed2144099f8a084c1d0e, Handshake 2025/04/30 12:17:03 client Long Header{Type: Handshake, DestConnectionID: 9a668666b78c20e2, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:17:03 client -> Sending packet 1 (36 bytes) for connection 754086ed2144099f8a084c1d0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 591.868µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client -> Sending packet 2 (46 bytes) for connection 754086ed2144099f8a084c1d0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:17:03 client <- Reading packet 2 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:17:03 client Dropping Handshake keys. 2025/04/30 12:17:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:17:03 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 77507757ccd3b2dc, StatelessResetToken: 0x1668fad195eec007d1535e2ce0d40729} 2025/04/30 12:17:03 client -> Sending packet 3 (37 bytes) for connection 754086ed2144099f8a084c1d0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 86.262µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client newly acked packets (2): [0 2] 2025/04/30 12:17:03 client updated RTT: 36.678ms (σ: 13.693ms) 2025/04/30 12:17:03 client ECN capability confirmed. 2025/04/30 12:17:03 client Canceling loss detection timer. 2025/04/30 12:17:03 client <- Reading packet 5 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1432, Offset + Data length: 1432} 2025/04/30 12:17:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:17:03 client <- Reading packet 6 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1432, Data length: 1430, Offset + Data length: 2862} 2025/04/30 12:17:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:17:03 client -> Sending packet 4 (37 bytes) for connection 754086ed2144099f8a084c1d0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 53.771µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client <- Reading packet 7 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2862, Data length: 1430, Offset + Data length: 4292} 2025/04/30 12:17:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:17:03 client <- Reading packet 8 (852 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4292, Data length: 828, Offset + Data length: 5120} 2025/04/30 12:17:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:17:03 client <- Reading packet 9 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:17:03 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:17:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 5120, Data length: 0, Offset + Data length: 5120} 2025/04/30 12:17:03 client -> Sending packet 5 (37 bytes) for connection 754086ed2144099f8a084c1d0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 59.411µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:17:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:17:03 client -> Sending packet 6 (30 bytes) for connection 754086ed2144099f8a084c1d0e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:17:03 client Short Header{DestConnectionID: 9a668666b78c20e2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:17:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:17:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:17:03 client Connection 754086ed2144099f8a084c1d0e closed.