2025/04/30 12:18:13 Requesting https://server4:443/hbhkiybyjk. 2025/04/30 12:18:13 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:13 Increased send buffer size to 14336 kiB 2025/04/30 12:18:13 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:13 Created qlog file: /logs/qlog/e15390eb0030c5ea170228454ac9d151.sqlog 2025/04/30 12:18:13 client Starting new connection to server4 ([::]:41486 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e15390eb0030c5ea170228454ac9d151, version v1 2025/04/30 12:18:13 Adding connection ID (empty). 2025/04/30 12:18:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:13 client -> Sending packet 0 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: e15390eb0030c5ea170228454ac9d151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:13 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:13 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:13 client -> Sending packet 1 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: e15390eb0030c5ea170228454ac9d151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:13 client -> Sending packet 2 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: e15390eb0030c5ea170228454ac9d151, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:13 client <- Reading packet 1 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1be65720b4202c54, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:13 client Received first packet. Switching destination connection ID to: 1be65720b4202c54 2025/04/30 12:18:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 12:18:13 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1be65720b4202c54, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:13 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs} 2025/04/30 12:18:13 client newly acked packets (1): [2] 2025/04/30 12:18:13 client updated RTT: 32.750383ms (σ: 16.375191ms) 2025/04/30 12:18:13 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1be65720b4202c54, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:13 client -> Sending packet 3 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:13 client Long Header{Type: Initial, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:13 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:14 client -> Sending packet 4 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:14 client Long Header{Type: Initial, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:14 client -> &wire.PingFrame{} 2025/04/30 12:18:14 client <- Reading packet 5 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1be65720b4202c54, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 12:18:14 client newly acked packets (1): [4] 2025/04/30 12:18:14 client updated RTT: 32.647ms (σ: 12.486ms) 2025/04/30 12:18:14 client -> Sending packet 5 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:14 client Long Header{Type: Initial, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:14 client -> &wire.PingFrame{} 2025/04/30 12:18:15 client <- Reading packet 7 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1be65720b4202c54, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:15 client -> Sending packet 6 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:15 client Long Header{Type: Initial, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:15 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 12:18:15 client -> Sending packet 7 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:15 client Long Header{Type: Initial, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:15 client -> &wire.PingFrame{} 2025/04/30 12:18:15 client -> Sending packet 8 (1280 bytes) for connection e15390eb0030c5ea170228454ac9d151, Initial 2025/04/30 12:18:15 client Long Header{Type: Initial, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:15 client -> &wire.PingFrame{} 2025/04/30 12:18:15 client <- Reading packet 4 (772 bytes) for connection (empty), Handshake 2025/04/30 12:18:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1be65720b4202c54, PacketNumber: 4, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 12:18:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e15390eb0030c5ea170228454ac9d151, InitialSourceConnectionID: 1be65720b4202c54, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x9c3f470179179e24ed1884656020666e, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:15 client -> Sending packet 0 (82 bytes) for connection e15390eb0030c5ea170228454ac9d151, Handshake 2025/04/30 12:18:15 client Long Header{Type: Handshake, DestConnectionID: 1be65720b4202c54, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:15 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:15 client Dropping Initial keys. 2025/04/30 12:18:15 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0dbb0fd189bdb8fe, StatelessResetToken: 0xea5c150c7474071cd34b88485e74f11d} 2025/04/30 12:18:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fc0f8423bbece420, StatelessResetToken: 0xdabf8f40b59e3c374337d880049bd9fe} 2025/04/30 12:18:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 04f2a25a739c77bc, StatelessResetToken: 0x3e96c15a83db60364774dbf44b5e965c} 2025/04/30 12:18:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:15 client -> Sending packet 0 (40 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.541843258s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client -> Sending packet 1 (46 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:15 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:18:15 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:15 client Dropping Handshake keys. 2025/04/30 12:18:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:15 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 69a43adbab174e83, StatelessResetToken: 0xb19c722e98eb207bcbd3d0ac8de381fd} 2025/04/30 12:18:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:15 client -> Sending packet 2 (35 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 107.89µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:15 client -> Sending packet 4 (29 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client Skipping packet number 3 2025/04/30 12:18:15 client -> Sending packet 5 (46 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:15 client <- Reading packet 4 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client newly acked packets (1): [5] 2025/04/30 12:18:15 client updated RTT: 32.413ms (σ: 9.832ms) 2025/04/30 12:18:15 client ECN capability confirmed. 2025/04/30 12:18:15 client setting loss timer for packet 4 (1-RTT) to 36.464625ms (in 2025-04-30 12:18:15.304376116 +0000 UTC m=+1.726330490) 2025/04/30 12:18:15 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 12:18:15.304376116 +0000 UTC m=+1.726330490 2025/04/30 12:18:15 client lost packet 4 (time threshold) 2025/04/30 12:18:15 client Canceling loss detection timer. 2025/04/30 12:18:15 client -> Sending packet 6 (29 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:15 client -> Sending packet 8 (29 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client -> Sending packet 9 (29 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client -> Sending packet 10 (1366 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.PingFrame{} 2025/04/30 12:18:15 client <- Reading packet 8 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:15 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:18:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 12:18:15 client -> Sending packet 12 (29 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client -> Sending packet 13 (29 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:15 client <- Reading packet 9 (32 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client newly acked packets (1): [13] 2025/04/30 12:18:15 client updated RTT: 32.222ms (σ: 7.755ms) 2025/04/30 12:18:15 client lost packet 10 (time threshold) 2025/04/30 12:18:15 client Canceling loss detection timer. 2025/04/30 12:18:15 client -> Sending packet 14 (1323 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:15 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:15 client -> &wire.PingFrame{} 2025/04/30 12:18:15 client <- Reading packet 10 (33 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:15 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:15 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 26.176ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:15 client newly acked packets (1): [14] 2025/04/30 12:18:15 client updated RTT: 32.295ms (σ: 5.962ms) 2025/04/30 12:18:17 client <- Reading packet 11 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:17 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:17 client <- Reading packet 12 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:17 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 69a43adbab174e83, StatelessResetToken: 0xb19c722e98eb207bcbd3d0ac8de381fd} 2025/04/30 12:18:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:17 client -> Sending packet 15 (1387 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:17 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:17 client -> &wire.PingFrame{} 2025/04/30 12:18:17 client -> Sending packet 16 (39 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:17 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:17 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 207.799µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:17 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:18:18 client <- Reading packet 16 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:18 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:18 client <- &wire.PingFrame{} 2025/04/30 12:18:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:18 client -> Sending packet 17 (41 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:18 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:18 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 0, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 12, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 136.436µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 12:18:18 client <- Reading packet 17 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:18 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:18 client -> Sending packet 18 (30 bytes) for connection e15390eb0030c5ea170228454ac9d151, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:18 client Short Header{DestConnectionID: 0dbb0fd189bdb8fe, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:18 client Connection e15390eb0030c5ea170228454ac9d151 closed. 2025/04/30 12:18:18 Requesting https://server4:443/jlgpphpkwk. 2025/04/30 12:18:18 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:18 Increased send buffer size to 14336 kiB 2025/04/30 12:18:18 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:18 Created qlog file: /logs/qlog/16f28ec13059a9f195627d3be9640419.sqlog 2025/04/30 12:18:18 client Starting new connection to server4 ([::]:37038 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 16f28ec13059a9f195627d3be9640419, version v1 2025/04/30 12:18:18 Adding connection ID (empty). 2025/04/30 12:18:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:18 client -> Sending packet 0 (1280 bytes) for connection 16f28ec13059a9f195627d3be9640419, Initial 2025/04/30 12:18:18 client Long Header{Type: Initial, DestConnectionID: 16f28ec13059a9f195627d3be9640419, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 12:18:18 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:18 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dcbe759b52185c5a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:18 client Received first packet. Switching destination connection ID to: dcbe759b52185c5a 2025/04/30 12:18:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 12:18:18 client newly acked packets (1): [0] 2025/04/30 12:18:18 client updated RTT: 33.076257ms (σ: 16.538128ms) 2025/04/30 12:18:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:18 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:18 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dcbe759b52185c5a, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 12:18:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 16f28ec13059a9f195627d3be9640419, InitialSourceConnectionID: dcbe759b52185c5a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x19110f52e40106b589ddd86db7cbcc1d, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:18 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 57a0a82c9ccf799a, StatelessResetToken: 0x0a6556fd90c028713e6aa8536018df47} 2025/04/30 12:18:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69aba16ecdf177d0, StatelessResetToken: 0xa7e915ba7a4263474411024dc1ee4354} 2025/04/30 12:18:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f02f95b73e6f4c0, StatelessResetToken: 0x74c672b08a826563eb9157bf7ab87347} 2025/04/30 12:18:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 16f28ec13059a9f195627d3be9640419 2025/04/30 12:18:18 client Long Header{Type: Initial, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:18 client Long Header{Type: Handshake, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:18 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:18 client Dropping Initial keys. 2025/04/30 12:18:18 client -> Sending packet 1 (43 bytes) for connection 16f28ec13059a9f195627d3be9640419, Handshake 2025/04/30 12:18:18 client Long Header{Type: Handshake, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:18 client -> Sending packet 1 (36 bytes) for connection 16f28ec13059a9f195627d3be9640419, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:18 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 832.949µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:18 client -> Sending packet 2 (74 bytes) for connection 16f28ec13059a9f195627d3be9640419, Handshake 2025/04/30 12:18:18 client Long Header{Type: Handshake, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:18 client -> Sending packet 3 (74 bytes) for connection 16f28ec13059a9f195627d3be9640419, Handshake 2025/04/30 12:18:18 client Long Header{Type: Handshake, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:18:19 client -> Sending packet 4 (74 bytes) for connection 16f28ec13059a9f195627d3be9640419, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client -> Sending packet 5 (74 bytes) for connection 16f28ec13059a9f195627d3be9640419, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 57a0a82c9ccf799a, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:19 client Dropping Handshake keys. 2025/04/30 12:18:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:19 client -> Sending packet 3 (56 bytes) for connection 16f28ec13059a9f195627d3be9640419, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 92.183µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client -> Sending packet 4 (48 bytes) for connection 16f28ec13059a9f195627d3be9640419, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 91662989fd9d3c19, StatelessResetToken: 0xbd0b155cd534f5610ad2fafa7115d304} 2025/04/30 12:18:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:19 client -> Sending packet 5 (37 bytes) for connection 16f28ec13059a9f195627d3be9640419, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 73.067µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:19 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:19 client -> Sending packet 6 (37 bytes) for connection 16f28ec13059a9f195627d3be9640419, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 37.125µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:19 client -> Sending packet 7 (30 bytes) for connection 16f28ec13059a9f195627d3be9640419, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 57a0a82c9ccf799a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:19 client Connection 16f28ec13059a9f195627d3be9640419 closed. 2025/04/30 12:18:19 Requesting https://server4:443/bxarunaabd. 2025/04/30 12:18:19 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:19 Increased send buffer size to 14336 kiB 2025/04/30 12:18:19 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:19 Created qlog file: /logs/qlog/8cf427781fb65120c52b78.sqlog 2025/04/30 12:18:19 client Starting new connection to server4 ([::]:52897 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8cf427781fb65120c52b78, version v1 2025/04/30 12:18:19 Adding connection ID (empty). 2025/04/30 12:18:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:19 client -> Sending packet 0 (1280 bytes) for connection 8cf427781fb65120c52b78, Initial 2025/04/30 12:18:19 client Long Header{Type: Initial, DestConnectionID: 8cf427781fb65120c52b78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:18:19 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:19 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f03666bb8cfc3656, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:19 client Received first packet. Switching destination connection ID to: f03666bb8cfc3656 2025/04/30 12:18:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/04/30 12:18:19 client newly acked packets (1): [0] 2025/04/30 12:18:19 client updated RTT: 32.92786ms (σ: 16.46393ms) 2025/04/30 12:18:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:19 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f03666bb8cfc3656, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8cf427781fb65120c52b78, InitialSourceConnectionID: f03666bb8cfc3656, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xc962c48608b47c1ecd4f297da323142f, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:19 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 77bed42360cf2499, StatelessResetToken: 0xc2bf550abfee65ac3254d9fe7e66be1f} 2025/04/30 12:18:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0281620154257390, StatelessResetToken: 0xf7241da1db4c0d1f26e8a7dfc3c6c1ac} 2025/04/30 12:18:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fce890031c1e91c9, StatelessResetToken: 0xe5837fb6868ed7348eec162a8e3a6545} 2025/04/30 12:18:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8cf427781fb65120c52b78 2025/04/30 12:18:19 client Long Header{Type: Initial, DestConnectionID: 77bed42360cf2499, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 77bed42360cf2499, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:19 client Dropping Initial keys. 2025/04/30 12:18:19 client -> Sending packet 1 (89 bytes) for connection 8cf427781fb65120c52b78, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 77bed42360cf2499, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client -> Sending packet 2 (36 bytes) for connection 8cf427781fb65120c52b78, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752.398µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:19 client -> Sending packet 2 (74 bytes) for connection 8cf427781fb65120c52b78, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 77bed42360cf2499, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client -> Sending packet 3 (74 bytes) for connection 8cf427781fb65120c52b78, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 77bed42360cf2499, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:19 client Dropping Handshake keys. 2025/04/30 12:18:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:19 client -> Sending packet 4 (37 bytes) for connection 8cf427781fb65120c52b78, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 70.782µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:19 client Skipping packet number 3 2025/04/30 12:18:19 client -> Sending packet 5 (46 bytes) for connection 8cf427781fb65120c52b78, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 02aefca4c9e45b60, StatelessResetToken: 0x7b1910a39598b99accf20f8e88c1bb2e} 2025/04/30 12:18:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:19 client -> Sending packet 6 (37 bytes) for connection 8cf427781fb65120c52b78, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 72.004µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:19 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:19 client -> Sending packet 7 (37 bytes) for connection 8cf427781fb65120c52b78, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 252.693µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:19 client -> Sending packet 8 (30 bytes) for connection 8cf427781fb65120c52b78, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 77bed42360cf2499, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:19 client Connection 8cf427781fb65120c52b78 closed. 2025/04/30 12:18:19 Requesting https://server4:443/xteyfzqdug. 2025/04/30 12:18:19 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:19 Increased send buffer size to 14336 kiB 2025/04/30 12:18:19 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:19 Created qlog file: /logs/qlog/6ce9494db4307f66c6a6bd.sqlog 2025/04/30 12:18:19 client Starting new connection to server4 ([::]:40242 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6ce9494db4307f66c6a6bd, version v1 2025/04/30 12:18:19 Adding connection ID (empty). 2025/04/30 12:18:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:19 client -> Sending packet 0 (1280 bytes) for connection 6ce9494db4307f66c6a6bd, Initial 2025/04/30 12:18:19 client Long Header{Type: Initial, DestConnectionID: 6ce9494db4307f66c6a6bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 12:18:19 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:19 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2522212d4c01bbba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:19 client Received first packet. Switching destination connection ID to: 2522212d4c01bbba 2025/04/30 12:18:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 12:18:19 client newly acked packets (1): [0] 2025/04/30 12:18:19 client updated RTT: 33.03399ms (σ: 16.516995ms) 2025/04/30 12:18:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:19 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2522212d4c01bbba, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/04/30 12:18:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6ce9494db4307f66c6a6bd, InitialSourceConnectionID: 2522212d4c01bbba, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x580968906583a57dd1f0c9f01f079b00, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6ce9494db4307f66c6a6bd 2025/04/30 12:18:19 client Long Header{Type: Initial, DestConnectionID: 2522212d4c01bbba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 2522212d4c01bbba, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client Dropping Initial keys. 2025/04/30 12:18:19 client -> Sending packet 1 (89 bytes) for connection 6ce9494db4307f66c6a6bd, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 2522212d4c01bbba, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:19 client -> Sending packet 2 (74 bytes) for connection 6ce9494db4307f66c6a6bd, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 2522212d4c01bbba, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client -> Sending packet 3 (74 bytes) for connection 6ce9494db4307f66c6a6bd, Handshake 2025/04/30 12:18:19 client Long Header{Type: Handshake, DestConnectionID: 2522212d4c01bbba, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:19 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:19 client Dropping Handshake keys. 2025/04/30 12:18:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:19 client -> Sending packet 2 (54 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 115.186µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client -> Sending packet 3 (46 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 12:18:19 client -> Sending packet 5 (46 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client -> Sending packet 6 (46 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:19 client -> Sending packet 7 (1366 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.PingFrame{} 2025/04/30 12:18:19 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client newly acked packets (1): [6] 2025/04/30 12:18:19 client updated RTT: 32.747ms (σ: 12.957ms) 2025/04/30 12:18:19 client ECN capability confirmed. 2025/04/30 12:18:19 client Canceling loss detection timer. 2025/04/30 12:18:19 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:19 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:19 client -> Sending packet 8 (36 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:19 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:19 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.270522ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:19 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:19 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 26.184ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:19 client newly acked packets (1): [7] 2025/04/30 12:18:19 client updated RTT: 32.776ms (σ: 9.776ms) 2025/04/30 12:18:20 client <- Reading packet 7 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:20 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:20 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:20 client -> Sending packet 9 (1409 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:20 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:20 client -> &wire.PingFrame{} 2025/04/30 12:18:20 client -> Sending packet 10 (39 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:20 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:20 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 161.753µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:20 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:20 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:20 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 88µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:20 client newly acked packets (1): [9] 2025/04/30 12:18:20 client updated RTT: 32.652ms (σ: 7.579ms) 2025/04/30 12:18:20 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:20 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:20 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:20 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:20 client -> Sending packet 11 (1430 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:20 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:20 client -> &wire.PingFrame{} 2025/04/30 12:18:20 client -> Sending packet 12 (41 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:20 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:20 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 199.994µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:18:20 client <- Reading packet 11 (31 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:20 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:20 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 48µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:20 client newly acked packets (1): [11] 2025/04/30 12:18:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:20 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:20 client -> Sending packet 13 (30 bytes) for connection 6ce9494db4307f66c6a6bd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:20 client Short Header{DestConnectionID: 2522212d4c01bbba, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:20 client Connection 6ce9494db4307f66c6a6bd closed. 2025/04/30 12:18:20 Requesting https://server4:443/ywgeqopnhv. 2025/04/30 12:18:20 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:20 Increased send buffer size to 14336 kiB 2025/04/30 12:18:20 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:20 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:20 Created qlog file: /logs/qlog/06f738a87652e92e3003d6fc69d418.sqlog 2025/04/30 12:18:20 client Starting new connection to server4 ([::]:46482 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 06f738a87652e92e3003d6fc69d418, version v1 2025/04/30 12:18:20 Adding connection ID (empty). 2025/04/30 12:18:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:20 client -> Sending packet 0 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:20 client Long Header{Type: Initial, DestConnectionID: 06f738a87652e92e3003d6fc69d418, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:20 client -> Sending packet 1 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:20 client Long Header{Type: Initial, DestConnectionID: 06f738a87652e92e3003d6fc69d418, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:20 client -> Sending packet 2 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:20 client Long Header{Type: Initial, DestConnectionID: 06f738a87652e92e3003d6fc69d418, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:21 client <- Reading packet 1 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a12ba657ffabe17a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:21 client Received first packet. Switching destination connection ID to: a12ba657ffabe17a 2025/04/30 12:18:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 12:18:21 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a12ba657ffabe17a, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client -> Sending packet 3 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: a12ba657ffabe17a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a12ba657ffabe17a, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:21 client -> Sending packet 4 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: a12ba657ffabe17a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:21 client -> Sending packet 5 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: a12ba657ffabe17a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:21 client -> Sending packet 6 (1280 bytes) for connection 06f738a87652e92e3003d6fc69d418, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: a12ba657ffabe17a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:21 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a12ba657ffabe17a, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:21 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 120µs} 2025/04/30 12:18:21 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a12ba657ffabe17a, PacketNumber: 1, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 12:18:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 06f738a87652e92e3003d6fc69d418, InitialSourceConnectionID: a12ba657ffabe17a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xc60f3efaa893deeaa17e53e5eba823ab, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:21 client -> Sending packet 0 (82 bytes) for connection 06f738a87652e92e3003d6fc69d418, Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: a12ba657ffabe17a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:21 client Dropping Initial keys. 2025/04/30 12:18:21 client -> Sending packet 0 (46 bytes) for connection 06f738a87652e92e3003d6fc69d418, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: a12ba657ffabe17a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:21 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a12ba657ffabe17a, PacketNumber: 2, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 12:18:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:21 client -> Sending packet 1 (43 bytes) for connection 06f738a87652e92e3003d6fc69d418, Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: a12ba657ffabe17a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:21 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:21 client Dropping Handshake keys. 2025/04/30 12:18:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:21 client -> Sending packet 1 (1366 bytes) for connection 06f738a87652e92e3003d6fc69d418, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: a12ba657ffabe17a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.PingFrame{} 2025/04/30 12:18:21 client -> Sending packet 2 (35 bytes) for connection 06f738a87652e92e3003d6fc69d418, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: a12ba657ffabe17a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 146.474µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:21 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:21 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:21 client -> Sending packet 3 (35 bytes) for connection 06f738a87652e92e3003d6fc69d418, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: a12ba657ffabe17a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 85.823µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:21 client -> Sending packet 4 (30 bytes) for connection 06f738a87652e92e3003d6fc69d418, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: a12ba657ffabe17a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:21 client Connection 06f738a87652e92e3003d6fc69d418 closed. 2025/04/30 12:18:21 Requesting https://server4:443/yltbmgwldr. 2025/04/30 12:18:21 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:21 Increased send buffer size to 14336 kiB 2025/04/30 12:18:21 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:21 Created qlog file: /logs/qlog/99040bf72896f48f.sqlog 2025/04/30 12:18:21 client Starting new connection to server4 ([::]:41142 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 99040bf72896f48f, version v1 2025/04/30 12:18:21 Adding connection ID (empty). 2025/04/30 12:18:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:21 client -> Sending packet 0 (1280 bytes) for connection 99040bf72896f48f, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: 99040bf72896f48f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:18:21 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:21 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56b4f57e584e93b4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:21 client Received first packet. Switching destination connection ID to: 56b4f57e584e93b4 2025/04/30 12:18:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 12:18:21 client newly acked packets (1): [0] 2025/04/30 12:18:21 client updated RTT: 32.960104ms (σ: 16.480052ms) 2025/04/30 12:18:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:21 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56b4f57e584e93b4, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 12:18:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 99040bf72896f48f, InitialSourceConnectionID: 56b4f57e584e93b4, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x07e62a78505e425dd3455f5694bb396e, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 99040bf72896f48f 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: 56b4f57e584e93b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: 56b4f57e584e93b4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:21 client Dropping Initial keys. 2025/04/30 12:18:21 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:21 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0492fa568f289519, StatelessResetToken: 0x4769952bf30433a050c535e4d4827dd9} 2025/04/30 12:18:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d89c0bb8a5f3c170, StatelessResetToken: 0x94b5772233f402248d83434abf1e5759} 2025/04/30 12:18:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a90bbac2775725c0, StatelessResetToken: 0x5d4b256cd4f1022a15acd1083d43a057} 2025/04/30 12:18:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:21 client -> Sending packet 1 (91 bytes) for connection 99040bf72896f48f, Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: 0492fa568f289519, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client Short Header{DestConnectionID: 0492fa568f289519, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:21 client -> Sending packet 1 (36 bytes) for connection 99040bf72896f48f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: 0492fa568f289519, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 814.699µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:21 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:21 client -> Sending packet 2 (37 bytes) for connection 99040bf72896f48f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:21 client Short Header{DestConnectionID: 0492fa568f289519, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 96.189µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:21 client -> Sending packet 2 (69 bytes) for connection 99040bf72896f48f, Handshake 2025/04/30 12:18:21 client Long Header{Type: Handshake, DestConnectionID: 0492fa568f289519, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:21 client Short Header{DestConnectionID: 0492fa568f289519, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:21 client Connection 99040bf72896f48f closed. 2025/04/30 12:18:21 Requesting https://server4:443/bvazjfvnvs. 2025/04/30 12:18:21 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:21 Increased send buffer size to 14336 kiB 2025/04/30 12:18:21 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:21 Created qlog file: /logs/qlog/6a041aad075b71ba39461a0b.sqlog 2025/04/30 12:18:21 client Starting new connection to server4 ([::]:34913 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a041aad075b71ba39461a0b, version v1 2025/04/30 12:18:21 Adding connection ID (empty). 2025/04/30 12:18:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:21 client -> Sending packet 0 (1280 bytes) for connection 6a041aad075b71ba39461a0b, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: 6a041aad075b71ba39461a0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:21 client -> Sending packet 1 (1280 bytes) for connection 6a041aad075b71ba39461a0b, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: 6a041aad075b71ba39461a0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:21 client -> Sending packet 2 (1280 bytes) for connection 6a041aad075b71ba39461a0b, Initial 2025/04/30 12:18:21 client Long Header{Type: Initial, DestConnectionID: 6a041aad075b71ba39461a0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:22 client -> Sending packet 3 (1280 bytes) for connection 6a041aad075b71ba39461a0b, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 6a041aad075b71ba39461a0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:22 client -> Sending packet 4 (1280 bytes) for connection 6a041aad075b71ba39461a0b, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 6a041aad075b71ba39461a0b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:22 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:22 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dc30fc89f34ddd93, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:22 client Received first packet. Switching destination connection ID to: dc30fc89f34ddd93 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 432µs} 2025/04/30 12:18:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:22 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dc30fc89f34ddd93, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a041aad075b71ba39461a0b, InitialSourceConnectionID: dc30fc89f34ddd93, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x4535932825678b7de283de46f70438e2, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:22 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: acf84055cb0989ca, StatelessResetToken: 0xaf14b2d028e6ecc860bcb1307fd194d6} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 24f295ec635eca14, StatelessResetToken: 0x4a3806aca5790370bf36181243c1a931} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ef95d3fe0e74c6e8, StatelessResetToken: 0xba6f5a9b232e10335a9afe44be515d69} 2025/04/30 12:18:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6a041aad075b71ba39461a0b 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: acf84055cb0989ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: acf84055cb0989ca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client Dropping Initial keys. 2025/04/30 12:18:22 client -> Sending packet 1 (43 bytes) for connection 6a041aad075b71ba39461a0b, Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: acf84055cb0989ca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client -> Sending packet 1 (36 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 866.751µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:22 client -> Sending packet 2 (74 bytes) for connection 6a041aad075b71ba39461a0b, Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: acf84055cb0989ca, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:22 client -> Sending packet 3 (74 bytes) for connection 6a041aad075b71ba39461a0b, Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: acf84055cb0989ca, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:22 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:22 client Dropping Handshake keys. 2025/04/30 12:18:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:22 client -> Sending packet 3 (56 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 86.402µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client -> Sending packet 4 (48 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client -> Sending packet 5 (1366 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.PingFrame{} 2025/04/30 12:18:22 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client newly acked packets (1): [4] 2025/04/30 12:18:22 client updated RTT: 30.764616ms (σ: 15.382308ms) 2025/04/30 12:18:22 client ECN capability confirmed. 2025/04/30 12:18:22 client Canceling loss detection timer. 2025/04/30 12:18:22 client <- Reading packet 4 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 64f874213d30c93f, StatelessResetToken: 0xdf3915605bd786475aa4821746a26cc7} 2025/04/30 12:18:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:22 client -> Sending packet 6 (37 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 212.932µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:22 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:22 client -> Sending packet 7 (37 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 95.569µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:22 client -> Sending packet 8 (30 bytes) for connection 6a041aad075b71ba39461a0b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: acf84055cb0989ca, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:22 client Connection 6a041aad075b71ba39461a0b closed. 2025/04/30 12:18:22 Requesting https://server4:443/yqmahacaea. 2025/04/30 12:18:22 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:22 Increased send buffer size to 14336 kiB 2025/04/30 12:18:22 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:22 Created qlog file: /logs/qlog/fb0b42c3792b86c8db7c8a3ca0eb3335.sqlog 2025/04/30 12:18:22 client Starting new connection to server4 ([::]:45877 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fb0b42c3792b86c8db7c8a3ca0eb3335, version v1 2025/04/30 12:18:22 Adding connection ID (empty). 2025/04/30 12:18:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:22 client -> Sending packet 0 (1280 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: fb0b42c3792b86c8db7c8a3ca0eb3335, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 12:18:22 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:22 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f41b913e3d33c9d0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:22 client Received first packet. Switching destination connection ID to: f41b913e3d33c9d0 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 12:18:22 client newly acked packets (1): [0] 2025/04/30 12:18:22 client updated RTT: 33.000468ms (σ: 16.500234ms) 2025/04/30 12:18:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:22 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f41b913e3d33c9d0, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 12:18:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fb0b42c3792b86c8db7c8a3ca0eb3335, InitialSourceConnectionID: f41b913e3d33c9d0, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xae1c6fd4ab1490fdf89714df47cde0b7, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: f41b913e3d33c9d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: f41b913e3d33c9d0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:22 client Dropping Initial keys. 2025/04/30 12:18:22 client -> Sending packet 1 (43 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: f41b913e3d33c9d0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client -> Sending packet 0 (46 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: f41b913e3d33c9d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:22 client Dropping Handshake keys. 2025/04/30 12:18:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:22 client -> Sending packet 1 (35 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: f41b913e3d33c9d0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 69.73µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:22 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 25.472ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client newly acked packets (1): [0] 2025/04/30 12:18:22 client updated RTT: 36.016ms (σ: 18.407ms) 2025/04/30 12:18:22 client ECN capability confirmed. 2025/04/30 12:18:22 client Canceling loss detection timer. 2025/04/30 12:18:22 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:22 client -> Sending packet 2 (38 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: f41b913e3d33c9d0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 1.087214ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client <- Reading packet 5 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b1615510fc3b5c8, StatelessResetToken: 0xccac0e3bb0577e9d7af28915e70b4cdd} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63530b3c482a8bde, StatelessResetToken: 0x2b7f0bc631903a0cd9e3a1be8a90a5b4} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d2dccce69a819e23, StatelessResetToken: 0xf36b4f28acc91475858c31a0fb679f1d} 2025/04/30 12:18:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:22 client -> Sending packet 3 (39 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: d2dccce69a819e23, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 82.635µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client <- Reading packet 6 (33 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client newly acked packets (1): [3] 2025/04/30 12:18:22 client updated RTT: 35.351ms (σ: 15.134ms) 2025/04/30 12:18:22 client Canceling loss detection timer. 2025/04/30 12:18:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:22 client Ignoring all packets below 6. 2025/04/30 12:18:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:22 client -> Sending packet 4 (30 bytes) for connection fb0b42c3792b86c8db7c8a3ca0eb3335, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: d2dccce69a819e23, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:22 client Connection fb0b42c3792b86c8db7c8a3ca0eb3335 closed. 2025/04/30 12:18:22 Requesting https://server4:443/kwaqeypoax. 2025/04/30 12:18:22 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:22 Increased send buffer size to 14336 kiB 2025/04/30 12:18:22 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:22 Created qlog file: /logs/qlog/23b86b9804789fc45d000fea0e815bb41003.sqlog 2025/04/30 12:18:22 client Starting new connection to server4 ([::]:44949 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 23b86b9804789fc45d000fea0e815bb41003, version v1 2025/04/30 12:18:22 Adding connection ID (empty). 2025/04/30 12:18:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:22 client -> Sending packet 0 (1280 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 23b86b9804789fc45d000fea0e815bb41003, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:22 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:22 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8eb5c4d831553819, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:22 client Received first packet. Switching destination connection ID to: 8eb5c4d831553819 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/04/30 12:18:22 client newly acked packets (1): [0] 2025/04/30 12:18:22 client updated RTT: 32.917704ms (σ: 16.458852ms) 2025/04/30 12:18:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:22 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8eb5c4d831553819, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:18:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 23b86b9804789fc45d000fea0e815bb41003, InitialSourceConnectionID: 8eb5c4d831553819, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa39a88f3f620603269910375b61adb4d, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 8eb5c4d831553819, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: 8eb5c4d831553819, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:22 client Dropping Initial keys. 2025/04/30 12:18:22 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 80d848df56ed283b, StatelessResetToken: 0x6e7ca9dd116b974bf5bf02c96b9a0c00} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 22478b9946caf5e5, StatelessResetToken: 0x4eefe9c351dfac1d8117de0fb7de7bf0} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3bd95a2b9481797, StatelessResetToken: 0xe3dc8ff793f1da2ab95db567ade2e9e8} 2025/04/30 12:18:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:22 client -> Sending packet 1 (91 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, Handshake 2025/04/30 12:18:22 client Long Header{Type: Handshake, DestConnectionID: 80d848df56ed283b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client -> Sending packet 1 (36 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 715.719µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:22 client -> Sending packet 2 (37 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 58.549µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client <- Reading packet 6 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:22 client Dropping Handshake keys. 2025/04/30 12:18:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:22 client -> Sending packet 3 (39 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 55.995µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:22 client -> Sending packet 5 (48 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client -> Sending packet 6 (48 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:22 client <- Reading packet 10 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 97d7bd147901c377, StatelessResetToken: 0x14aa50ceea340f5f1dbe3e5ed8e809a3} 2025/04/30 12:18:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:22 client -> Sending packet 7 (41 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 70.632µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client <- Reading packet 11 (29 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 26.312ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:22 client newly acked packets (1): [6] 2025/04/30 12:18:22 client updated RTT: 35.93ms (σ: 18.371ms) 2025/04/30 12:18:22 client ECN capability confirmed. 2025/04/30 12:18:22 client Canceling loss detection timer. 2025/04/30 12:18:22 client <- Reading packet 12 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:22 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:22 client -> Sending packet 8 (30 bytes) for connection 23b86b9804789fc45d000fea0e815bb41003, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:22 client Short Header{DestConnectionID: 80d848df56ed283b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:22 client Connection 23b86b9804789fc45d000fea0e815bb41003 closed. 2025/04/30 12:18:22 Requesting https://server4:443/moshmncwtv. 2025/04/30 12:18:22 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:22 Increased send buffer size to 14336 kiB 2025/04/30 12:18:22 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:22 Created qlog file: /logs/qlog/794572729f63538e6abeed3b91f945c0b8a9.sqlog 2025/04/30 12:18:22 client Starting new connection to server4 ([::]:45578 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 794572729f63538e6abeed3b91f945c0b8a9, version v1 2025/04/30 12:18:22 Adding connection ID (empty). 2025/04/30 12:18:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:22 client -> Sending packet 0 (1280 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 794572729f63538e6abeed3b91f945c0b8a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:22 client -> Sending packet 1 (1280 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 794572729f63538e6abeed3b91f945c0b8a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:22 client -> Sending packet 2 (1280 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Initial 2025/04/30 12:18:22 client Long Header{Type: Initial, DestConnectionID: 794572729f63538e6abeed3b91f945c0b8a9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:23 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:23 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c174adc1d5562cd1, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:23 client Received first packet. Switching destination connection ID to: c174adc1d5562cd1 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client -> Sending packet 3 (1280 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: c174adc1d5562cd1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:23 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c174adc1d5562cd1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:23 client -> Sending packet 4 (1280 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: c174adc1d5562cd1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client <- Reading packet 2 (776 bytes) for connection (empty), Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c174adc1d5562cd1, PacketNumber: 2, PacketNumberLen: 1, Length: 759, Version: v1} 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:18:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 794572729f63538e6abeed3b91f945c0b8a9, InitialSourceConnectionID: c174adc1d5562cd1, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x3463d9426bbb60a13e14cda10fe0b0af, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:23 client -> Sending packet 0 (82 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: c174adc1d5562cd1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client Dropping Initial keys. 2025/04/30 12:18:23 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2995f82e4040b1e4, StatelessResetToken: 0xbeadfaa4f28e7bf565ec6375b564d35d} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0b707aa98a8e574, StatelessResetToken: 0x14fe92adc1f7b41d388164cbda07b59d} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c04cb37a7c4b340, StatelessResetToken: 0x9994fb43c4ba83d67069177b24f0ee48} 2025/04/30 12:18:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:23 client -> Sending packet 0 (59 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 2995f82e4040b1e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 334.583099ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client <- Reading packet 3 (776 bytes) for connection (empty), Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c174adc1d5562cd1, PacketNumber: 3, PacketNumberLen: 1, Length: 759, Version: v1} 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:18:23 client -> Sending packet 1 (43 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 2995f82e4040b1e4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client <- Reading packet 4 (776 bytes) for connection (empty), Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c174adc1d5562cd1, PacketNumber: 4, PacketNumberLen: 1, Length: 759, Version: v1} 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:18:23 client -> Sending packet 2 (43 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 2995f82e4040b1e4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:23 client -> Sending packet 3 (74 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 2995f82e4040b1e4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client -> Sending packet 4 (74 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 2995f82e4040b1e4, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:23 client Dropping Handshake keys. 2025/04/30 12:18:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:23 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:23 client -> Sending packet 2 (56 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 2995f82e4040b1e4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 83.456µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client -> Sending packet 3 (48 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 2995f82e4040b1e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client -> Sending packet 4 (1366 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 2995f82e4040b1e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.PingFrame{} 2025/04/30 12:18:23 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client newly acked packets (1): [3] 2025/04/30 12:18:23 client updated RTT: 30.769636ms (σ: 15.384818ms) 2025/04/30 12:18:23 client ECN capability confirmed. 2025/04/30 12:18:23 client Canceling loss detection timer. 2025/04/30 12:18:23 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:23 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:23 client -> Sending packet 5 (37 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 2995f82e4040b1e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 58.56µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:23 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:23 client -> Sending packet 6 (30 bytes) for connection 794572729f63538e6abeed3b91f945c0b8a9, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 2995f82e4040b1e4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:23 client Connection 794572729f63538e6abeed3b91f945c0b8a9 closed. 2025/04/30 12:18:23 Requesting https://server4:443/qsocfzbcbp. 2025/04/30 12:18:23 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:23 Increased send buffer size to 14336 kiB 2025/04/30 12:18:23 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:23 Created qlog file: /logs/qlog/14e24806d6ce105c72.sqlog 2025/04/30 12:18:23 client Starting new connection to server4 ([::]:46277 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 14e24806d6ce105c72, version v1 2025/04/30 12:18:23 Adding connection ID (empty). 2025/04/30 12:18:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:23 client -> Sending packet 0 (1280 bytes) for connection 14e24806d6ce105c72, Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: 14e24806d6ce105c72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:23 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:23 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31c95a68d483af24, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:23 client Received first packet. Switching destination connection ID to: 31c95a68d483af24 2025/04/30 12:18:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/04/30 12:18:23 client newly acked packets (1): [0] 2025/04/30 12:18:23 client updated RTT: 32.948494ms (σ: 16.474247ms) 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:23 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 31c95a68d483af24, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 14e24806d6ce105c72, InitialSourceConnectionID: 31c95a68d483af24, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x627ade48cfec6c26b417ca1dd22f33d2, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:23 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 14e24806d6ce105c72 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: 31c95a68d483af24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 31c95a68d483af24, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client Dropping Initial keys. 2025/04/30 12:18:23 client -> Sending packet 1 (89 bytes) for connection 14e24806d6ce105c72, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 31c95a68d483af24, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client Short Header{DestConnectionID: 31c95a68d483af24, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:23 client -> Sending packet 1 (35 bytes) for connection 14e24806d6ce105c72, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 31c95a68d483af24, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 69.731µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:23 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:23 client -> Sending packet 2 (69 bytes) for connection 14e24806d6ce105c72, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 31c95a68d483af24, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:23 client Short Header{DestConnectionID: 31c95a68d483af24, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:23 client Connection 14e24806d6ce105c72 closed. 2025/04/30 12:18:23 Requesting https://server4:443/taxzjgopag. 2025/04/30 12:18:23 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:23 Increased send buffer size to 14336 kiB 2025/04/30 12:18:23 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:23 Created qlog file: /logs/qlog/ad0a2400b44ee5112942db09c492f7750ee0cd.sqlog 2025/04/30 12:18:23 client Starting new connection to server4 ([::]:56182 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ad0a2400b44ee5112942db09c492f7750ee0cd, version v1 2025/04/30 12:18:23 Adding connection ID (empty). 2025/04/30 12:18:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:23 client -> Sending packet 0 (1280 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: ad0a2400b44ee5112942db09c492f7750ee0cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:23 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:23 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8c533c2f72a8de9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:23 client Received first packet. Switching destination connection ID to: f8c533c2f72a8de9 2025/04/30 12:18:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/04/30 12:18:23 client newly acked packets (1): [0] 2025/04/30 12:18:23 client updated RTT: 32.889395ms (σ: 16.444697ms) 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:23 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8c533c2f72a8de9, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:18:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ad0a2400b44ee5112942db09c492f7750ee0cd, InitialSourceConnectionID: f8c533c2f72a8de9, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xd98386bae64ead513c0334add465cc29, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:23 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd 2025/04/30 12:18:23 client Long Header{Type: Initial, DestConnectionID: f8c533c2f72a8de9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: f8c533c2f72a8de9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client Dropping Initial keys. 2025/04/30 12:18:23 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1bae38e5e62d4f72, StatelessResetToken: 0x74e16e4bfe0b80f29edf7f7ed8918a06} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e69d69fe944f2bd6, StatelessResetToken: 0x5e4cddc29fa99ee510d8a21b1ed7e6fc} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6ffe73dc6d0b1caa, StatelessResetToken: 0x830177e9d6f8612c107bfa439dd1d6b9} 2025/04/30 12:18:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:23 client -> Sending packet 1 (91 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 1bae38e5e62d4f72, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client -> Sending packet 1 (36 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 810.969µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:23 client -> Sending packet 2 (74 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 1bae38e5e62d4f72, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client -> Sending packet 3 (74 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, Handshake 2025/04/30 12:18:23 client Long Header{Type: Handshake, DestConnectionID: 1bae38e5e62d4f72, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:23 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:23 client Dropping Handshake keys. 2025/04/30 12:18:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:23 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:23 client -> Sending packet 3 (56 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 78.787µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client -> Sending packet 4 (48 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:23 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 525c811eff876f30, StatelessResetToken: 0xab95482be999819d54be5fca8368ae59} 2025/04/30 12:18:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:23 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:23 client -> Sending packet 5 (36 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:23 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:23 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.235223ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.712ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:23 client newly acked packets (1): [4] 2025/04/30 12:18:23 client updated RTT: 35.828ms (σ: 18.21ms) 2025/04/30 12:18:23 client ECN capability confirmed. 2025/04/30 12:18:23 client Canceling loss detection timer. 2025/04/30 12:18:23 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:23 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 525c811eff876f30, StatelessResetToken: 0xab95482be999819d54be5fca8368ae59} 2025/04/30 12:18:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:24 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:24 client -> Sending packet 6 (38 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 25.273261ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:24 client <- Reading packet 10 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 525c811eff876f30, StatelessResetToken: 0xab95482be999819d54be5fca8368ae59} 2025/04/30 12:18:24 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:24 client -> Sending packet 7 (1366 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.PingFrame{} 2025/04/30 12:18:24 client -> Sending packet 8 (39 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 203µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:18:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:24 client <- Reading packet 12 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 525c811eff876f30, StatelessResetToken: 0xab95482be999819d54be5fca8368ae59} 2025/04/30 12:18:24 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:24 client <- Reading packet 13 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 525c811eff876f30, StatelessResetToken: 0xab95482be999819d54be5fca8368ae59} 2025/04/30 12:18:24 client -> Sending packet 9 (41 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 139.581µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client <- Reading packet 14 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:24 client -> Sending packet 10 (30 bytes) for connection ad0a2400b44ee5112942db09c492f7750ee0cd, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 1bae38e5e62d4f72, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:24 client Connection ad0a2400b44ee5112942db09c492f7750ee0cd closed. 2025/04/30 12:18:24 Requesting https://server4:443/goykerbyyx. 2025/04/30 12:18:24 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:24 Increased send buffer size to 14336 kiB 2025/04/30 12:18:24 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:24 Created qlog file: /logs/qlog/3afe020d9f0ca2bb27.sqlog 2025/04/30 12:18:24 client Starting new connection to server4 ([::]:40707 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3afe020d9f0ca2bb27, version v1 2025/04/30 12:18:24 Adding connection ID (empty). 2025/04/30 12:18:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:24 client -> Sending packet 0 (1280 bytes) for connection 3afe020d9f0ca2bb27, Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: 3afe020d9f0ca2bb27, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:24 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:24 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1a746b13ab9e46be, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:24 client Received first packet. Switching destination connection ID to: 1a746b13ab9e46be 2025/04/30 12:18:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 12:18:24 client newly acked packets (1): [0] 2025/04/30 12:18:24 client updated RTT: 33.016801ms (σ: 16.5084ms) 2025/04/30 12:18:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:24 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1a746b13ab9e46be, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:18:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3afe020d9f0ca2bb27, InitialSourceConnectionID: 1a746b13ab9e46be, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x318c0d72fdc20d4e2413f97bfbe3adca, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3afe020d9f0ca2bb27 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: 1a746b13ab9e46be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: 1a746b13ab9e46be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:24 client Dropping Initial keys. 2025/04/30 12:18:24 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15d6a9ce5df53933, StatelessResetToken: 0x2d7bfc58192be21eaaecf8004edf5245} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 420fb6b599bf006f, StatelessResetToken: 0x69f4bd612a0581e56dd6cb56c1ef5023} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2e9047f37ebe176f, StatelessResetToken: 0xb5457658cecd62ab1015529de0b6a3a9} 2025/04/30 12:18:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:24 client -> Sending packet 1 (91 bytes) for connection 3afe020d9f0ca2bb27, Handshake 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: 15d6a9ce5df53933, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client Short Header{DestConnectionID: 15d6a9ce5df53933, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:24 client -> Sending packet 1 (36 bytes) for connection 3afe020d9f0ca2bb27, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 15d6a9ce5df53933, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 783.961µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 69bf8c4c56e462fe, StatelessResetToken: 0x7b2ba4f360fb46d77251b6a1b649fab9} 2025/04/30 12:18:24 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:24 client -> Sending packet 2 (37 bytes) for connection 3afe020d9f0ca2bb27, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 15d6a9ce5df53933, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 73.187µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:24 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:24 client -> Sending packet 3 (37 bytes) for connection 3afe020d9f0ca2bb27, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 15d6a9ce5df53933, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 67.676µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:24 client -> Sending packet 2 (69 bytes) for connection 3afe020d9f0ca2bb27, Handshake 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: 15d6a9ce5df53933, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:24 client Short Header{DestConnectionID: 15d6a9ce5df53933, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:24 client Connection 3afe020d9f0ca2bb27 closed. 2025/04/30 12:18:24 Requesting https://server4:443/jzxbiibtwa. 2025/04/30 12:18:24 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:24 Increased send buffer size to 14336 kiB 2025/04/30 12:18:24 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:24 Created qlog file: /logs/qlog/f44d3054661b5f3724f2e8aabefe11027b.sqlog 2025/04/30 12:18:24 client Starting new connection to server4 ([::]:36073 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f44d3054661b5f3724f2e8aabefe11027b, version v1 2025/04/30 12:18:24 Adding connection ID (empty). 2025/04/30 12:18:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:24 client -> Sending packet 0 (1280 bytes) for connection f44d3054661b5f3724f2e8aabefe11027b, Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: f44d3054661b5f3724f2e8aabefe11027b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:24 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:24 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1a76f141faca4953, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:24 client Received first packet. Switching destination connection ID to: 1a76f141faca4953 2025/04/30 12:18:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 328µs} 2025/04/30 12:18:24 client newly acked packets (1): [0] 2025/04/30 12:18:24 client updated RTT: 32.876758ms (σ: 16.438379ms) 2025/04/30 12:18:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:24 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1a76f141faca4953, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f44d3054661b5f3724f2e8aabefe11027b, InitialSourceConnectionID: 1a76f141faca4953, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x02bc27bed87b1da78f33fae767a62786, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f44d3054661b5f3724f2e8aabefe11027b 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: 1a76f141faca4953, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: 1a76f141faca4953, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:24 client Dropping Initial keys. 2025/04/30 12:18:24 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 122e3a37c6356e88, StatelessResetToken: 0x013f9bcbc79fd79bcfd00f5883eb3288} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 89a50a7d40656509, StatelessResetToken: 0x63935bd672dea9d3940a40dad03f1304} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 88b0f64a80e54584, StatelessResetToken: 0x14b1fb3b002697b7eb68f045e81a6334} 2025/04/30 12:18:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:24 client -> Sending packet 1 (91 bytes) for connection f44d3054661b5f3724f2e8aabefe11027b, Handshake 2025/04/30 12:18:24 client Long Header{Type: Handshake, DestConnectionID: 122e3a37c6356e88, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client Short Header{DestConnectionID: 122e3a37c6356e88, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:24 client -> Sending packet 1 (36 bytes) for connection f44d3054661b5f3724f2e8aabefe11027b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 122e3a37c6356e88, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 747.537µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:24 client Dropping Handshake keys. 2025/04/30 12:18:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:24 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:24 client -> Sending packet 2 (37 bytes) for connection f44d3054661b5f3724f2e8aabefe11027b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 122e3a37c6356e88, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 55.604µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.536ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:24 client newly acked packets (1): [0] 2025/04/30 12:18:24 client Canceling loss detection timer. 2025/04/30 12:18:24 client <- Reading packet 6 (1074 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:24 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 062c77843d59ba55, StatelessResetToken: 0x11cd12fad117d36be7b3b659d06c9e8f} 2025/04/30 12:18:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:24 client -> Sending packet 3 (30 bytes) for connection f44d3054661b5f3724f2e8aabefe11027b, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:24 client Short Header{DestConnectionID: 122e3a37c6356e88, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:24 client Connection f44d3054661b5f3724f2e8aabefe11027b closed. 2025/04/30 12:18:24 Requesting https://server4:443/xpltelluig. 2025/04/30 12:18:24 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:24 Increased send buffer size to 14336 kiB 2025/04/30 12:18:24 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:24 Created qlog file: /logs/qlog/14dfa254d9cd3c2a6a2463ac.sqlog 2025/04/30 12:18:24 client Starting new connection to server4 ([::]:60678 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 14dfa254d9cd3c2a6a2463ac, version v1 2025/04/30 12:18:24 Adding connection ID (empty). 2025/04/30 12:18:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:24 client -> Sending packet 0 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: 14dfa254d9cd3c2a6a2463ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:24 client -> Sending packet 1 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: 14dfa254d9cd3c2a6a2463ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:24 client -> Sending packet 2 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:24 client Long Header{Type: Initial, DestConnectionID: 14dfa254d9cd3c2a6a2463ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:24 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:25 client -> Sending packet 3 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:25 client Long Header{Type: Initial, DestConnectionID: 14dfa254d9cd3c2a6a2463ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:25 client -> Sending packet 4 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:25 client Long Header{Type: Initial, DestConnectionID: 14dfa254d9cd3c2a6a2463ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:25 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 68242019749ed311, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:25 client Received first packet. Switching destination connection ID to: 68242019749ed311 2025/04/30 12:18:25 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 56µs} 2025/04/30 12:18:25 client newly acked packets (1): [4] 2025/04/30 12:18:25 client updated RTT: 32.838876ms (σ: 16.419438ms) 2025/04/30 12:18:25 client Queueing packet (768 bytes) for later decryption 2025/04/30 12:18:25 client Queueing packet (768 bytes) for later decryption 2025/04/30 12:18:25 client -> Sending packet 5 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:25 client Long Header{Type: Initial, DestConnectionID: 68242019749ed311, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:25 client -> &wire.PingFrame{} 2025/04/30 12:18:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:26 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 68242019749ed311, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:26 client -> Sending packet 6 (1280 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Initial 2025/04/30 12:18:26 client Long Header{Type: Initial, DestConnectionID: 68242019749ed311, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:26 client <- Reading packet 1 (768 bytes) for connection (empty), Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 68242019749ed311, PacketNumber: 1, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 12:18:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 14dfa254d9cd3c2a6a2463ac, InitialSourceConnectionID: 68242019749ed311, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x749977ef8a81a90725634bbb3d6dac0b, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:26 client <- Reading packet 2 (768 bytes) for connection (empty), Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 68242019749ed311, PacketNumber: 2, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 12:18:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:26 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ea00421e383c49f, StatelessResetToken: 0xe091598db329b714a033196d4498e876} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2268a0d990c5367e, StatelessResetToken: 0xed701fc7b4211bd1ae980ffbd906c745} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6ee0c5698a5436f, StatelessResetToken: 0xd6b2c3fd0d48da5b4d72b8a11d52303d} 2025/04/30 12:18:26 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:26 client -> Sending packet 0 (111 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: 5ea00421e383c49f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:26 client Dropping Initial keys. 2025/04/30 12:18:26 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:18:26 client -> Sending packet 1 (57 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.502995346s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:26 client <- Reading packet 3 (768 bytes) for connection (empty), Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 68242019749ed311, PacketNumber: 3, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 12:18:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:26 client -> Sending packet 1 (43 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: 5ea00421e383c49f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client <- Reading packet 4 (768 bytes) for connection (empty), Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 68242019749ed311, PacketNumber: 4, PacketNumberLen: 1, Length: 751, Version: v1} 2025/04/30 12:18:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:26 client -> Sending packet 2 (43 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: 5ea00421e383c49f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:26 client -> Sending packet 3 (74 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: 5ea00421e383c49f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:26 client -> Sending packet 4 (74 bytes) for connection 14dfa254d9cd3c2a6a2463ac, Handshake 2025/04/30 12:18:26 client Long Header{Type: Handshake, DestConnectionID: 5ea00421e383c49f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:26 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:26 client Dropping Handshake keys. 2025/04/30 12:18:26 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:26 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:26 client -> Sending packet 3 (37 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 69.871µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:26 client Skipping packet number 2 2025/04/30 12:18:26 client -> Sending packet 4 (46 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:26 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:26 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:26 client -> Sending packet 5 (37 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 69.4µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:26 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:18:26 client <- Reading packet 4 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ea00421e383c49f, StatelessResetToken: 0xe091598db329b714a033196d4498e876} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2268a0d990c5367e, StatelessResetToken: 0xed701fc7b4211bd1ae980ffbd906c745} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6ee0c5698a5436f, StatelessResetToken: 0xd6b2c3fd0d48da5b4d72b8a11d52303d} 2025/04/30 12:18:26 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:26 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:26 client -> Sending packet 6 (38 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.256135ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client <- Reading packet 6 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ea00421e383c49f, StatelessResetToken: 0xe091598db329b714a033196d4498e876} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2268a0d990c5367e, StatelessResetToken: 0xed701fc7b4211bd1ae980ffbd906c745} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6ee0c5698a5436f, StatelessResetToken: 0xd6b2c3fd0d48da5b4d72b8a11d52303d} 2025/04/30 12:18:26 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:26 client -> Sending packet 7 (1366 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.PingFrame{} 2025/04/30 12:18:26 client -> Sending packet 8 (39 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 168.385µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client <- Reading packet 7 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client newly acked packets (1): [7] 2025/04/30 12:18:26 client ECN capability confirmed. 2025/04/30 12:18:26 client lost packet 3 (time threshold) 2025/04/30 12:18:26 client lost packet 4 (time threshold) 2025/04/30 12:18:26 client Canceling loss detection timer. 2025/04/30 12:18:26 client -> Sending packet 9 (48 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:26 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:26 client -> Sending packet 11 (48 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:26 client -> Sending packet 12 (48 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:26 client <- Reading packet 8 (30 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 32µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client -> Sending packet 13 (1409 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.PingFrame{} 2025/04/30 12:18:26 client <- Reading packet 9 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c99cdd076d1fcfba, StatelessResetToken: 0xbfe6bae9059b839f19457295eab17f74} 2025/04/30 12:18:26 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:26 client <- Reading packet 10 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:26 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:26 client -> Sending packet 14 (39 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 73.137µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:26 client <- Reading packet 15 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:26 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:26 client <- &wire.PingFrame{} 2025/04/30 12:18:26 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:26 client -> Sending packet 15 (41 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:26 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:26 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 0, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 10, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 67.435µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client <- Reading packet 18 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.PingFrame{} 2025/04/30 12:18:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:27 client -> Sending packet 16 (43 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:27 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 0, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 15, Smallest: 15}, {Largest: 10, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 66.785µs, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client <- Reading packet 20 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:27 client -> Sending packet 17 (45 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:27 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 0, AckRanges: {{Largest: 20, Smallest: 20}, {Largest: 18, Smallest: 18}, {Largest: 15, Smallest: 15}, {Largest: 10, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 90.038µs, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:27 client -> Sending packet 18 (30 bytes) for connection 14dfa254d9cd3c2a6a2463ac, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:27 client Short Header{DestConnectionID: 5ea00421e383c49f, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:27 client Connection 14dfa254d9cd3c2a6a2463ac closed. 2025/04/30 12:18:27 Requesting https://server4:443/nyskwmwgpo. 2025/04/30 12:18:27 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:27 Increased send buffer size to 14336 kiB 2025/04/30 12:18:27 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:27 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:27 Created qlog file: /logs/qlog/bd03f2cd61dded478a32.sqlog 2025/04/30 12:18:27 client Starting new connection to server4 ([::]:42049 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bd03f2cd61dded478a32, version v1 2025/04/30 12:18:27 Adding connection ID (empty). 2025/04/30 12:18:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:27 client -> Sending packet 0 (1280 bytes) for connection bd03f2cd61dded478a32, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: bd03f2cd61dded478a32, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:27 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:27 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7da23b24c417ff6a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:27 client Received first packet. Switching destination connection ID to: 7da23b24c417ff6a 2025/04/30 12:18:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 12:18:27 client newly acked packets (1): [0] 2025/04/30 12:18:27 client updated RTT: 32.935478ms (σ: 16.467739ms) 2025/04/30 12:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:27 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:27 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7da23b24c417ff6a, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:18:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bd03f2cd61dded478a32, InitialSourceConnectionID: 7da23b24c417ff6a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x32560128da0f2b9f74441d93ff3c71de, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bd03f2cd61dded478a32 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: 7da23b24c417ff6a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client Long Header{Type: Handshake, DestConnectionID: 7da23b24c417ff6a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:27 client Dropping Initial keys. 2025/04/30 12:18:27 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ac6708da247ecd7c, StatelessResetToken: 0xf249ec7a3c0b724274cd3d51564b679a} 2025/04/30 12:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8860e9f30b5840b, StatelessResetToken: 0xde80de09b3a671553b6135f51c2d75ee} 2025/04/30 12:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 36c400cd3d9532dd, StatelessResetToken: 0xc3ed3fa8d35a819d5cf187bc5f3d73a8} 2025/04/30 12:18:27 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:27 client -> Sending packet 1 (91 bytes) for connection bd03f2cd61dded478a32, Handshake 2025/04/30 12:18:27 client Long Header{Type: Handshake, DestConnectionID: ac6708da247ecd7c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client Short Header{DestConnectionID: ac6708da247ecd7c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:27 client -> Sending packet 1 (36 bytes) for connection bd03f2cd61dded478a32, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:27 client Short Header{DestConnectionID: ac6708da247ecd7c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 761.39µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:27 client Dropping Handshake keys. 2025/04/30 12:18:27 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:27 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:27 client -> Sending packet 2 (37 bytes) for connection bd03f2cd61dded478a32, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:27 client Short Header{DestConnectionID: ac6708da247ecd7c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 60.925µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 26.6ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client newly acked packets (1): [0] 2025/04/30 12:18:27 client Canceling loss detection timer. 2025/04/30 12:18:27 client <- Reading packet 6 (1074 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:27 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dabe0ff87580dc77, StatelessResetToken: 0x295a6d04eb43f8973c9d1deaafa5f0f3} 2025/04/30 12:18:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:27 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:27 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:27 client -> Sending packet 3 (30 bytes) for connection bd03f2cd61dded478a32, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:27 client Short Header{DestConnectionID: ac6708da247ecd7c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:27 client Connection bd03f2cd61dded478a32 closed. 2025/04/30 12:18:27 Requesting https://server4:443/ukupylxcfa. 2025/04/30 12:18:27 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:27 Increased send buffer size to 14336 kiB 2025/04/30 12:18:27 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:27 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:27 Created qlog file: /logs/qlog/232792d66fcf5cdae7.sqlog 2025/04/30 12:18:27 client Starting new connection to server4 ([::]:58060 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 232792d66fcf5cdae7, version v1 2025/04/30 12:18:27 Adding connection ID (empty). 2025/04/30 12:18:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:27 client -> Sending packet 0 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: 232792d66fcf5cdae7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:18:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:27 client -> Sending packet 1 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: 232792d66fcf5cdae7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:18:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:27 client -> Sending packet 2 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: 232792d66fcf5cdae7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 12:18:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:27 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:27 client <- Reading packet 1 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:27 client Received first packet. Switching destination connection ID to: e92f59189c16bf1d 2025/04/30 12:18:27 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 40µs} 2025/04/30 12:18:27 client newly acked packets (1): [2] 2025/04/30 12:18:27 client updated RTT: 33.074978ms (σ: 16.537489ms) 2025/04/30 12:18:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:27 client -> Sending packet 3 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:27 client -> &wire.PingFrame{} 2025/04/30 12:18:27 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:27 client -> Sending packet 4 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:27 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:27 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:27 client -> Sending packet 5 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:27 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 12:18:28 client -> Sending packet 6 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:28 client -> &wire.PingFrame{} 2025/04/30 12:18:28 client -> Sending packet 7 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:28 client -> &wire.PingFrame{} 2025/04/30 12:18:28 client <- Reading packet 6 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:28 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 48µs} 2025/04/30 12:18:28 client newly acked packets (1): [7] 2025/04/30 12:18:28 client updated RTT: 33.034ms (σ: 12.482ms) 2025/04/30 12:18:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:28 client -> Sending packet 8 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:28 client -> &wire.PingFrame{} 2025/04/30 12:18:28 client <- Reading packet 7 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:28 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 64µs} 2025/04/30 12:18:28 client newly acked packets (1): [8] 2025/04/30 12:18:28 client updated RTT: 32.866ms (σ: 9.696ms) 2025/04/30 12:18:28 client <- Reading packet 9 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:28 client -> Sending packet 9 (1280 bytes) for connection 232792d66fcf5cdae7, Initial 2025/04/30 12:18:28 client Long Header{Type: Initial, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:28 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client <- Reading packet 3 (766 bytes) for connection (empty), Handshake 2025/04/30 12:18:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e92f59189c16bf1d, PacketNumber: 3, PacketNumberLen: 1, Length: 749, Version: v1} 2025/04/30 12:18:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:18:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 232792d66fcf5cdae7, InitialSourceConnectionID: e92f59189c16bf1d, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x816a50c98e182c07d4cd6a6c7e29af2c, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:29 client -> Sending packet 0 (82 bytes) for connection 232792d66fcf5cdae7, Handshake 2025/04/30 12:18:29 client Long Header{Type: Handshake, DestConnectionID: e92f59189c16bf1d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:29 client Dropping Initial keys. 2025/04/30 12:18:29 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76b6ce04bf9ab2d7, StatelessResetToken: 0xa377c9153d86871d1165aac2a74aec89} 2025/04/30 12:18:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: badf0f0f8bd17caa, StatelessResetToken: 0x5c77f13f029ddba2791d041e6c32c3eb} 2025/04/30 12:18:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 497c0647fa44aba3, StatelessResetToken: 0x4914c45441f182524537df9561c99cf7} 2025/04/30 12:18:29 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:29 client -> Sending packet 0 (59 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:29 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.541003553s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:29 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:29 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:29 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:29 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:29 client -> Sending packet 1 (37 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:29 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:29 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 65.012µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 26.56ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client Peer doesn't await address validation any longer. 2025/04/30 12:18:29 client newly acked packets (1): [0] 2025/04/30 12:18:29 client updated RTT: 32.8ms (σ: 7.403ms) 2025/04/30 12:18:29 client ECN capability confirmed. 2025/04/30 12:18:29 client Canceling loss detection timer. 2025/04/30 12:18:29 client Dropping Handshake keys. 2025/04/30 12:18:29 client Ignoring all packets below 1. 2025/04/30 12:18:29 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:18:29 client <- Reading packet 6 (47 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:29 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:29 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7d1449d7f02e6089, StatelessResetToken: 0x8c2f7b8117befb3fae4145f4c9e14394} 2025/04/30 12:18:29 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:29 client -> Sending packet 2 (1366 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:29 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:29 client -> &wire.PingFrame{} 2025/04/30 12:18:29 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:29 client -> Sending packet 3 (38 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:29 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:29 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.32006ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client <- Reading packet 7 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:29 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:29 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 26.28ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:29 client newly acked packets (1): [2] 2025/04/30 12:18:29 client updated RTT: 32.825ms (σ: 5.604ms) 2025/04/30 12:18:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:30 client <- Reading packet 8 (47 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:30 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7d1449d7f02e6089, StatelessResetToken: 0x8c2f7b8117befb3fae4145f4c9e14394} 2025/04/30 12:18:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:30 client -> Sending packet 4 (1409 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:30 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:30 client -> &wire.PingFrame{} 2025/04/30 12:18:30 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:30 client -> Sending packet 5 (38 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:30 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:30 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.421909ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:31 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:18:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:33 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:18:34 client <- Reading packet 12 (47 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7d1449d7f02e6089, StatelessResetToken: 0x8c2f7b8117befb3fae4145f4c9e14394} 2025/04/30 12:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:34 client -> Sending packet 6 (39 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 142.046µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 14 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:34 client -> Sending packet 7 (41 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 3, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 75.522µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:34 client -> Sending packet 8 (30 bytes) for connection 232792d66fcf5cdae7, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 76b6ce04bf9ab2d7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:34 client Connection 232792d66fcf5cdae7 closed. 2025/04/30 12:18:34 Requesting https://server4:443/lecydbermn. 2025/04/30 12:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:34 Increased send buffer size to 14336 kiB 2025/04/30 12:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:34 Created qlog file: /logs/qlog/387a1b4208e2eaeb80864115d936.sqlog 2025/04/30 12:18:34 client Starting new connection to server4 ([::]:51435 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 387a1b4208e2eaeb80864115d936, version v1 2025/04/30 12:18:34 Adding connection ID (empty). 2025/04/30 12:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:34 client -> Sending packet 0 (1280 bytes) for connection 387a1b4208e2eaeb80864115d936, Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: 387a1b4208e2eaeb80864115d936, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:34 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:34 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5bc0e82a40daa3e0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:34 client Received first packet. Switching destination connection ID to: 5bc0e82a40daa3e0 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 12:18:34 client newly acked packets (1): [0] 2025/04/30 12:18:34 client updated RTT: 33.03897ms (σ: 16.519485ms) 2025/04/30 12:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:34 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5bc0e82a40daa3e0, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 387a1b4208e2eaeb80864115d936, InitialSourceConnectionID: 5bc0e82a40daa3e0, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xe13b48ca08d38ad177dc94a1d999b6c0, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 387a1b4208e2eaeb80864115d936 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: 5bc0e82a40daa3e0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: 5bc0e82a40daa3e0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:34 client Dropping Initial keys. 2025/04/30 12:18:34 client -> Sending packet 1 (43 bytes) for connection 387a1b4208e2eaeb80864115d936, Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: 5bc0e82a40daa3e0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client -> Sending packet 0 (46 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5bc0e82a40daa3e0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:34 client Dropping Handshake keys. 2025/04/30 12:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:34 client -> Sending packet 1 (35 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5bc0e82a40daa3e0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 63.107µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 2 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7338ab4a626b9573, StatelessResetToken: 0x9600bd8e5488ce238cf00931ccc52c15} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27adc887f9bbcead, StatelessResetToken: 0x949404da3b747541f54a2ffeaea5d1af} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f2ffcfd4db0d4bce, StatelessResetToken: 0xf7bc39eff46ea93202314403743c4aba} 2025/04/30 12:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:34 client -> Sending packet 2 (37 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 79.969µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:34 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f6b960b131aeb5c2, StatelessResetToken: 0xa6cabd5c045b876f3614c332537f2731} 2025/04/30 12:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:34 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:34 client -> Sending packet 3 (36 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.291048ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 26.224ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client newly acked packets (1): [2] 2025/04/30 12:18:34 client updated RTT: 36.007ms (σ: 18.327ms) 2025/04/30 12:18:34 client ECN capability confirmed. 2025/04/30 12:18:34 client lost packet 0 (time threshold) 2025/04/30 12:18:34 client Canceling loss detection timer. 2025/04/30 12:18:34 client Ignoring all packets below 3. 2025/04/30 12:18:34 client -> Sending packet 4 (46 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:34 client -> Sending packet 6 (46 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client -> Sending packet 7 (46 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client -> Sending packet 8 (1366 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.PingFrame{} 2025/04/30 12:18:34 client <- Reading packet 5 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 24µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 7 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:34 client -> Sending packet 9 (37 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 80.642µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 48µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client newly acked packets (2): [7 8] 2025/04/30 12:18:34 client updated RTT: 35.513ms (σ: 14.733ms) 2025/04/30 12:18:34 client Canceling loss detection timer. 2025/04/30 12:18:34 client <- Reading packet 9 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:34 client -> Sending packet 10 (30 bytes) for connection 387a1b4208e2eaeb80864115d936, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: f2ffcfd4db0d4bce, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:34 client Connection 387a1b4208e2eaeb80864115d936 closed. 2025/04/30 12:18:34 Requesting https://server4:443/dnxqrycipt. 2025/04/30 12:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:34 Increased send buffer size to 14336 kiB 2025/04/30 12:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:34 Created qlog file: /logs/qlog/d2a85f393693ae2069adeaa8996c5c52dc.sqlog 2025/04/30 12:18:34 client Starting new connection to server4 ([::]:42647 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d2a85f393693ae2069adeaa8996c5c52dc, version v1 2025/04/30 12:18:34 Adding connection ID (empty). 2025/04/30 12:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:34 client -> Sending packet 0 (1280 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: d2a85f393693ae2069adeaa8996c5c52dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:34 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:34 client -> Sending packet 1 (1280 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: d2a85f393693ae2069adeaa8996c5c52dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:34 client -> Sending packet 2 (1280 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: d2a85f393693ae2069adeaa8996c5c52dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:34 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:34 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6adb913ca69538bb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:34 client Received first packet. Switching destination connection ID to: 6adb913ca69538bb 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 440µs} 2025/04/30 12:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:34 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6adb913ca69538bb, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:18:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d2a85f393693ae2069adeaa8996c5c52dc, InitialSourceConnectionID: 6adb913ca69538bb, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x295dc69e57b15735cd18ddcb1d65f336, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:34 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b6ea15c1bbdb6338, StatelessResetToken: 0x08786b19b939c789706a5c0ed27a90fc} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4c6850b347e0b7f9, StatelessResetToken: 0xb26645ef97a3bb1772d14cc288adb7fb} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac67c38ef7ccf1f5, StatelessResetToken: 0xa1f95b9f4f201babb5c105db874f2f91} 2025/04/30 12:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: b6ea15c1bbdb6338, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: b6ea15c1bbdb6338, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:34 client Short Header{DestConnectionID: b6ea15c1bbdb6338, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client Dropping Initial keys. 2025/04/30 12:18:34 client -> Sending packet 1 (43 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: b6ea15c1bbdb6338, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client -> Sending packet 1 (36 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: b6ea15c1bbdb6338, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 828.822µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 05186ff09a9ab3ed, StatelessResetToken: 0xcb6381316078150b9999906d37313b11} 2025/04/30 12:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:34 client -> Sending packet 2 (37 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: b6ea15c1bbdb6338, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 117.981µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:34 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:34 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:34 client -> Sending packet 3 (37 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: b6ea15c1bbdb6338, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 59.472µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:34 client -> Sending packet 2 (69 bytes) for connection d2a85f393693ae2069adeaa8996c5c52dc, Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: b6ea15c1bbdb6338, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:34 client Short Header{DestConnectionID: b6ea15c1bbdb6338, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:34 client Connection d2a85f393693ae2069adeaa8996c5c52dc closed. 2025/04/30 12:18:34 Requesting https://server4:443/bzvzoqfdlw. 2025/04/30 12:18:34 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:34 Increased send buffer size to 14336 kiB 2025/04/30 12:18:34 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:34 Created qlog file: /logs/qlog/77200c96fa2a587f.sqlog 2025/04/30 12:18:34 client Starting new connection to server4 ([::]:57839 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 77200c96fa2a587f, version v1 2025/04/30 12:18:34 Adding connection ID (empty). 2025/04/30 12:18:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:34 client -> Sending packet 0 (1280 bytes) for connection 77200c96fa2a587f, Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: 77200c96fa2a587f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:18:34 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:34 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cc220616b59bcd3f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:34 client Received first packet. Switching destination connection ID to: cc220616b59bcd3f 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/04/30 12:18:34 client newly acked packets (1): [0] 2025/04/30 12:18:34 client updated RTT: 32.952787ms (σ: 16.476393ms) 2025/04/30 12:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:34 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc220616b59bcd3f, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:18:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 77200c96fa2a587f, InitialSourceConnectionID: cc220616b59bcd3f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x6fb41bea3be87f3fa453308c31657ad8, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 77200c96fa2a587f 2025/04/30 12:18:34 client Long Header{Type: Initial, DestConnectionID: cc220616b59bcd3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: cc220616b59bcd3f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:34 client Dropping Initial keys. 2025/04/30 12:18:34 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5289014e9ad71890, StatelessResetToken: 0x7b7f50c94f55ae7d6f1251638ff9ae3f} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5a3143123e1a333e, StatelessResetToken: 0x6ad89c58345169f9f801bfb89000f56a} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1d775bc06dee7467, StatelessResetToken: 0x50b520756d5a987333cb60e005a045d9} 2025/04/30 12:18:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:34 client -> Sending packet 1 (91 bytes) for connection 77200c96fa2a587f, Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: 5289014e9ad71890, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client -> Sending packet 1 (36 bytes) for connection 77200c96fa2a587f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 677.53µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:34 client -> Sending packet 2 (74 bytes) for connection 77200c96fa2a587f, Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: 5289014e9ad71890, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:34 client -> Sending packet 3 (74 bytes) for connection 77200c96fa2a587f, Handshake 2025/04/30 12:18:34 client Long Header{Type: Handshake, DestConnectionID: 5289014e9ad71890, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:34 client <- Reading packet 2 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1d775bc06dee7467, StatelessResetToken: 0x50b520756d5a987333cb60e005a045d9} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5a3143123e1a333e, StatelessResetToken: 0x6ad89c58345169f9f801bfb89000f56a} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5289014e9ad71890, StatelessResetToken: 0x7b7f50c94f55ae7d6f1251638ff9ae3f} 2025/04/30 12:18:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:34 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:34 client Dropping Handshake keys. 2025/04/30 12:18:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:34 client -> Sending packet 3 (58 bytes) for connection 77200c96fa2a587f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 182.962µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client -> Sending packet 4 (48 bytes) for connection 77200c96fa2a587f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:34 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:34 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5e4d19d8cc017b82, StatelessResetToken: 0xbfb7db60438cf668708192453b8b6444} 2025/04/30 12:18:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:34 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:34 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:34 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:34 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:34 client -> Sending packet 5 (37 bytes) for connection 77200c96fa2a587f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:34 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:34 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 68.358µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.68ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client newly acked packets (1): [4] 2025/04/30 12:18:35 client updated RTT: 35.89ms (σ: 18.233ms) 2025/04/30 12:18:35 client ECN capability confirmed. 2025/04/30 12:18:35 client Canceling loss detection timer. 2025/04/30 12:18:35 client <- Reading packet 9 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.PingFrame{} 2025/04/30 12:18:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:35 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.PingFrame{} 2025/04/30 12:18:35 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:35 client -> Sending packet 6 (39 bytes) for connection 77200c96fa2a587f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 65.544µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client <- Reading packet 11 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:35 client -> Sending packet 7 (30 bytes) for connection 77200c96fa2a587f, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 5289014e9ad71890, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:35 client Connection 77200c96fa2a587f closed. 2025/04/30 12:18:35 Requesting https://server4:443/zndgrqzebr. 2025/04/30 12:18:35 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:35 Increased send buffer size to 14336 kiB 2025/04/30 12:18:35 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:35 Created qlog file: /logs/qlog/a84242b08b0b8c34939b6e.sqlog 2025/04/30 12:18:35 client Starting new connection to server4 ([::]:60398 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a84242b08b0b8c34939b6e, version v1 2025/04/30 12:18:35 Adding connection ID (empty). 2025/04/30 12:18:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:35 client -> Sending packet 0 (1280 bytes) for connection a84242b08b0b8c34939b6e, Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: a84242b08b0b8c34939b6e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:35 client -> Sending packet 1 (1280 bytes) for connection a84242b08b0b8c34939b6e, Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: a84242b08b0b8c34939b6e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:35 client -> Sending packet 2 (1280 bytes) for connection a84242b08b0b8c34939b6e, Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: a84242b08b0b8c34939b6e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:35 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:35 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8fbf5df445ba9876, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:35 client Received first packet. Switching destination connection ID to: 8fbf5df445ba9876 2025/04/30 12:18:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 368µs} 2025/04/30 12:18:35 client newly acked packets (1): [2] 2025/04/30 12:18:35 client updated RTT: 34.046561ms (σ: 17.02328ms) 2025/04/30 12:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:35 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fbf5df445ba9876, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a84242b08b0b8c34939b6e, InitialSourceConnectionID: 8fbf5df445ba9876, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xb31c92e2036a576be971a25bab5b7cf9, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:35 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c82a85cab0d064a, StatelessResetToken: 0x1fc3dc6afcbed15b96289beeb26d2c9d} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eb8754a78b7011cc, StatelessResetToken: 0x63bf5a9889822ad3e437873a2e889a1f} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 97fe7f15d1e35b0b, StatelessResetToken: 0xabac14daff13350125b4da9e399b9885} 2025/04/30 12:18:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a84242b08b0b8c34939b6e 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:35 client Short Header{DestConnectionID: 4c82a85cab0d064a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:35 client Dropping Initial keys. 2025/04/30 12:18:35 client -> Sending packet 1 (43 bytes) for connection a84242b08b0b8c34939b6e, Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client -> Sending packet 1 (36 bytes) for connection a84242b08b0b8c34939b6e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 4c82a85cab0d064a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.010712ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:35 client -> Sending packet 2 (74 bytes) for connection a84242b08b0b8c34939b6e, Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:35 client -> Sending packet 3 (74 bytes) for connection a84242b08b0b8c34939b6e, Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:18:35 client -> Sending packet 4 (74 bytes) for connection a84242b08b0b8c34939b6e, Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:35 client -> Sending packet 5 (74 bytes) for connection a84242b08b0b8c34939b6e, Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 4c82a85cab0d064a, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:35 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:35 client Dropping Handshake keys. 2025/04/30 12:18:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:35 client -> Sending packet 3 (56 bytes) for connection a84242b08b0b8c34939b6e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 4c82a85cab0d064a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 142.482µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:35 client -> Sending packet 4 (48 bytes) for connection a84242b08b0b8c34939b6e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 4c82a85cab0d064a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:35 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client newly acked packets (1): [4] 2025/04/30 12:18:35 client updated RTT: 33.631ms (σ: 13.595ms) 2025/04/30 12:18:35 client ECN capability confirmed. 2025/04/30 12:18:35 client Canceling loss detection timer. 2025/04/30 12:18:35 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f091be1de00044b7, StatelessResetToken: 0xa8709257022144cb4acf9c598ee461d0} 2025/04/30 12:18:35 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:35 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:35 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:35 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:35 client -> Sending packet 5 (35 bytes) for connection a84242b08b0b8c34939b6e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 4c82a85cab0d064a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 68.358µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:35 client -> Sending packet 6 (30 bytes) for connection a84242b08b0b8c34939b6e, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 4c82a85cab0d064a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:35 client Connection a84242b08b0b8c34939b6e closed. 2025/04/30 12:18:35 Requesting https://server4:443/qoecyvszjm. 2025/04/30 12:18:35 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:35 Increased send buffer size to 14336 kiB 2025/04/30 12:18:35 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:35 Created qlog file: /logs/qlog/b5dd5b7b084e820926e2b8e3af2b62f724.sqlog 2025/04/30 12:18:35 client Starting new connection to server4 ([::]:54457 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b5dd5b7b084e820926e2b8e3af2b62f724, version v1 2025/04/30 12:18:35 Adding connection ID (empty). 2025/04/30 12:18:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:35 client -> Sending packet 0 (1280 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: b5dd5b7b084e820926e2b8e3af2b62f724, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:35 client -> Sending packet 1 (1280 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: b5dd5b7b084e820926e2b8e3af2b62f724, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:35 client -> Sending packet 2 (1280 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: b5dd5b7b084e820926e2b8e3af2b62f724, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:35 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:35 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ad39c360e587995b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:35 client Received first packet. Switching destination connection ID to: ad39c360e587995b 2025/04/30 12:18:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 376µs} 2025/04/30 12:18:35 client newly acked packets (1): [2] 2025/04/30 12:18:35 client updated RTT: 34.033615ms (σ: 17.016807ms) 2025/04/30 12:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:35 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ad39c360e587995b, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 12:18:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b5dd5b7b084e820926e2b8e3af2b62f724, InitialSourceConnectionID: ad39c360e587995b, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x1776a9af2b384e23bccf1a2a4b7d00f8, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724 2025/04/30 12:18:35 client Long Header{Type: Initial, DestConnectionID: ad39c360e587995b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: ad39c360e587995b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:35 client Dropping Initial keys. 2025/04/30 12:18:35 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3977f69d409054dc, StatelessResetToken: 0x795a36b1c1c29fdcdac9abe34da29412} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25419e39865b1934, StatelessResetToken: 0x7f652e3724c8e753724019bb17a38496} 2025/04/30 12:18:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 03d515864df2f137, StatelessResetToken: 0xaf154300dfe24d3b319062438a4cf94e} 2025/04/30 12:18:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:35 client -> Sending packet 1 (91 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:35 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:35 client Short Header{DestConnectionID: 3977f69d409054dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:35 client -> Sending packet 1 (36 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:35 client Short Header{DestConnectionID: 3977f69d409054dc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 747.84µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:36 client -> Sending packet 2 (74 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:36 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:36 client -> Sending packet 3 (74 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:36 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:36 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:18:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:18:36 client -> Sending packet 4 (74 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:36 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:36 client -> Sending packet 5 (74 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:36 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 12:18:36 client -> Sending packet 6 (74 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:36 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:36 client -> Sending packet 7 (74 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, Handshake 2025/04/30 12:18:36 client Long Header{Type: Handshake, DestConnectionID: 3977f69d409054dc, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:36 client <- Reading packet 2 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 03d515864df2f137, StatelessResetToken: 0xaf154300dfe24d3b319062438a4cf94e} 2025/04/30 12:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25419e39865b1934, StatelessResetToken: 0x7f652e3724c8e753724019bb17a38496} 2025/04/30 12:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3977f69d409054dc, StatelessResetToken: 0x795a36b1c1c29fdcdac9abe34da29412} 2025/04/30 12:18:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:36 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:36 client Dropping Handshake keys. 2025/04/30 12:18:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:36 client -> Sending packet 3 (58 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:36 client Short Header{DestConnectionID: 3977f69d409054dc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 139.241µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:36 client -> Sending packet 4 (48 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:36 client Short Header{DestConnectionID: 3977f69d409054dc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:36 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:36 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a2e88a5bf1a43f0e, StatelessResetToken: 0xe389f7b0c43bcdee961812737714b366} 2025/04/30 12:18:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:36 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:36 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:36 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:36 client -> Sending packet 5 (37 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:36 client Short Header{DestConnectionID: 3977f69d409054dc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:36 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 84.11µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:36 client <- Reading packet 7 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:36 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:36 client -> Sending packet 6 (30 bytes) for connection b5dd5b7b084e820926e2b8e3af2b62f724, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:36 client Short Header{DestConnectionID: 3977f69d409054dc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:36 client Connection b5dd5b7b084e820926e2b8e3af2b62f724 closed. 2025/04/30 12:18:36 Requesting https://server4:443/wihbirgrcz. 2025/04/30 12:18:36 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:36 Increased send buffer size to 14336 kiB 2025/04/30 12:18:36 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:36 Created qlog file: /logs/qlog/7148ff9723a8e3b3585b9dc52328.sqlog 2025/04/30 12:18:36 client Starting new connection to server4 ([::]:48664 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7148ff9723a8e3b3585b9dc52328, version v1 2025/04/30 12:18:36 Adding connection ID (empty). 2025/04/30 12:18:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:36 client -> Sending packet 0 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:36 client Long Header{Type: Initial, DestConnectionID: 7148ff9723a8e3b3585b9dc52328, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:37 client -> Sending packet 1 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:37 client Long Header{Type: Initial, DestConnectionID: 7148ff9723a8e3b3585b9dc52328, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:37 client -> Sending packet 2 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:37 client Long Header{Type: Initial, DestConnectionID: 7148ff9723a8e3b3585b9dc52328, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:37 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:37 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:37 client -> Sending packet 3 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:37 client Long Header{Type: Initial, DestConnectionID: 7148ff9723a8e3b3585b9dc52328, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:37 client -> Sending packet 4 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:37 client Long Header{Type: Initial, DestConnectionID: 7148ff9723a8e3b3585b9dc52328, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:37 client <- Reading packet 4 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0544b397cdd6ec7e, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:37 client Received first packet. Switching destination connection ID to: 0544b397cdd6ec7e 2025/04/30 12:18:37 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 48µs} 2025/04/30 12:18:37 client newly acked packets (1): [4] 2025/04/30 12:18:37 client updated RTT: 32.843161ms (σ: 16.42158ms) 2025/04/30 12:18:37 client Queueing packet (771 bytes) for later decryption 2025/04/30 12:18:37 client Queueing packet (771 bytes) for later decryption 2025/04/30 12:18:38 client -> Sending packet 5 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: 0544b397cdd6ec7e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:38 client -> &wire.PingFrame{} 2025/04/30 12:18:38 client <- Reading packet 5 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0544b397cdd6ec7e, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:38 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 80µs} 2025/04/30 12:18:38 client newly acked packets (1): [5] 2025/04/30 12:18:38 client updated RTT: 32.715ms (σ: 12.57ms) 2025/04/30 12:18:38 client -> Sending packet 6 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: 0544b397cdd6ec7e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:38 client -> &wire.PingFrame{} 2025/04/30 12:18:38 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0544b397cdd6ec7e, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client -> Sending packet 7 (1280 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: 0544b397cdd6ec7e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:38 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0544b397cdd6ec7e, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 12:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:18:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7148ff9723a8e3b3585b9dc52328, InitialSourceConnectionID: 0544b397cdd6ec7e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x03fa6be4079f837218499bfe5aad5a7e, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:38 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0544b397cdd6ec7e, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 12:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:18:38 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 80ec1644726e017f, StatelessResetToken: 0xa5bebbd2c9a56f4a48cf3d3b21f15eb7} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c0e37ae1156cb6ee, StatelessResetToken: 0x420c60bff671ac36f32ae643514aed40} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8e11b18d9f92ca8d, StatelessResetToken: 0x2ae46fdec0b57c3b48f40f7c7a441a3c} 2025/04/30 12:18:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:38 client -> Sending packet 0 (111 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Handshake 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: 80ec1644726e017f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:38 client Short Header{DestConnectionID: 80ec1644726e017f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:38 client Dropping Initial keys. 2025/04/30 12:18:38 client -> Sending packet 1 (57 bytes) for connection 7148ff9723a8e3b3585b9dc52328, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:38 client Short Header{DestConnectionID: 80ec1644726e017f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.50296021s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:38 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:18:38 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9787d9089baa1a04, StatelessResetToken: 0x64c0dd29f83e3c3de8f882486ca207fe} 2025/04/30 12:18:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:38 client -> Sending packet 2 (37 bytes) for connection 7148ff9723a8e3b3585b9dc52328, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:38 client Short Header{DestConnectionID: 80ec1644726e017f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 63.369µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:38 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:38 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:38 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:38 client -> Sending packet 3 (37 bytes) for connection 7148ff9723a8e3b3585b9dc52328, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:38 client Short Header{DestConnectionID: 80ec1644726e017f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32.062µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:38 client -> Sending packet 1 (69 bytes) for connection 7148ff9723a8e3b3585b9dc52328, Handshake 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: 80ec1644726e017f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:38 client Short Header{DestConnectionID: 80ec1644726e017f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:38 client Connection 7148ff9723a8e3b3585b9dc52328 closed. 2025/04/30 12:18:38 Requesting https://server4:443/kswhenikpc. 2025/04/30 12:18:38 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:38 Increased send buffer size to 14336 kiB 2025/04/30 12:18:38 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:38 Created qlog file: /logs/qlog/c4adac5c23af09217dfbc8.sqlog 2025/04/30 12:18:38 client Starting new connection to server4 ([::]:47479 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c4adac5c23af09217dfbc8, version v1 2025/04/30 12:18:38 Adding connection ID (empty). 2025/04/30 12:18:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:38 client -> Sending packet 0 (1280 bytes) for connection c4adac5c23af09217dfbc8, Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: c4adac5c23af09217dfbc8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:38 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:38 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1ce3f9b28e8b8824, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:38 client Received first packet. Switching destination connection ID to: 1ce3f9b28e8b8824 2025/04/30 12:18:38 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 12:18:38 client newly acked packets (1): [0] 2025/04/30 12:18:38 client updated RTT: 33.004359ms (σ: 16.502179ms) 2025/04/30 12:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:38 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:38 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1ce3f9b28e8b8824, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:38 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:38 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:38 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c4adac5c23af09217dfbc8, InitialSourceConnectionID: 1ce3f9b28e8b8824, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xbf6074659744545b471c20a1cb4739a6, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:38 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 540f781275a9013b, StatelessResetToken: 0x7f9720fe02b7e3e974a37e4348346817} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bc4867ce826c3d6b, StatelessResetToken: 0x290d2cc45b9fe21bb25abe1bd9daff2e} 2025/04/30 12:18:38 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac8ea11f4bde4f01, StatelessResetToken: 0xac2413557b357927cd448b47ff315cd5} 2025/04/30 12:18:38 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:38 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c4adac5c23af09217dfbc8 2025/04/30 12:18:38 client Long Header{Type: Initial, DestConnectionID: 540f781275a9013b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: 540f781275a9013b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:38 client Short Header{DestConnectionID: 540f781275a9013b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:38 client Dropping Initial keys. 2025/04/30 12:18:38 client -> Sending packet 1 (43 bytes) for connection c4adac5c23af09217dfbc8, Handshake 2025/04/30 12:18:38 client Long Header{Type: Handshake, DestConnectionID: 540f781275a9013b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client -> Sending packet 1 (36 bytes) for connection c4adac5c23af09217dfbc8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:38 client Short Header{DestConnectionID: 540f781275a9013b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 810.597µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:38 client -> Sending packet 2 (37 bytes) for connection c4adac5c23af09217dfbc8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:38 client Short Header{DestConnectionID: 540f781275a9013b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:38 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 50.405µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:38 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:38 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.568ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:38 client Peer doesn't await address validation any longer. 2025/04/30 12:18:38 client newly acked packets (1): [0] 2025/04/30 12:18:38 client Canceling loss detection timer. 2025/04/30 12:18:38 client Dropping Handshake keys. 2025/04/30 12:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:39 client <- Reading packet 9 (47 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a930b6ff43a3eb50, StatelessResetToken: 0x9e3256a52ffaa5f7beb1252b957a4ef7} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client <- Reading packet 10 (47 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a930b6ff43a3eb50, StatelessResetToken: 0x9e3256a52ffaa5f7beb1252b957a4ef7} 2025/04/30 12:18:39 client -> Sending packet 3 (1366 bytes) for connection c4adac5c23af09217dfbc8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 540f781275a9013b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.PingFrame{} 2025/04/30 12:18:39 client -> Sending packet 4 (41 bytes) for connection c4adac5c23af09217dfbc8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 540f781275a9013b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 202.98µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 11 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:39 client -> Sending packet 5 (30 bytes) for connection c4adac5c23af09217dfbc8, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 540f781275a9013b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:39 client Connection c4adac5c23af09217dfbc8 closed. 2025/04/30 12:18:39 Requesting https://server4:443/debfthmmpt. 2025/04/30 12:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:39 Increased send buffer size to 14336 kiB 2025/04/30 12:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:39 Created qlog file: /logs/qlog/e7a80e3639eb73387cbb80822ffd2fced0.sqlog 2025/04/30 12:18:39 client Starting new connection to server4 ([::]:37268 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e7a80e3639eb73387cbb80822ffd2fced0, version v1 2025/04/30 12:18:39 Adding connection ID (empty). 2025/04/30 12:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:39 client -> Sending packet 0 (1280 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: e7a80e3639eb73387cbb80822ffd2fced0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:18:39 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:39 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d7da2362fe69c1ed, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:39 client Received first packet. Switching destination connection ID to: d7da2362fe69c1ed 2025/04/30 12:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 12:18:39 client newly acked packets (1): [0] 2025/04/30 12:18:39 client updated RTT: 33.000843ms (σ: 16.500421ms) 2025/04/30 12:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:39 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d7da2362fe69c1ed, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/04/30 12:18:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e7a80e3639eb73387cbb80822ffd2fced0, InitialSourceConnectionID: d7da2362fe69c1ed, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa4c4eb515facca802cdbaef385ca3321, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: d7da2362fe69c1ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: d7da2362fe69c1ed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client Dropping Initial keys. 2025/04/30 12:18:39 client -> Sending packet 1 (43 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: d7da2362fe69c1ed, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client -> Sending packet 0 (46 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: d7da2362fe69c1ed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:39 client -> Sending packet 2 (74 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: d7da2362fe69c1ed, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client -> Sending packet 3 (74 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: d7da2362fe69c1ed, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:39 client Dropping Handshake keys. 2025/04/30 12:18:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:39 client -> Sending packet 2 (54 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: d7da2362fe69c1ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 74.439µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client -> Sending packet 3 (46 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: d7da2362fe69c1ed, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client <- Reading packet 2 (110 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26e5d40eca11e085, StatelessResetToken: 0xb41a98a417cfbf2abfc5b465685368ca} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a445a8a8c24db9e8, StatelessResetToken: 0x7dcd5b1ce4b916ce0e8118b23e3f7906} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2c2398ab5c270654, StatelessResetToken: 0xc10f047c147ed74c42ec569ca8c913bd} 2025/04/30 12:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:39 client -> Sending packet 4 (37 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 2c2398ab5c270654, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 98.645µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:39 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:39 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:39 client -> Sending packet 5 (36 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 2c2398ab5c270654, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.358156ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 64a28a6ee2fd64c1, StatelessResetToken: 0xd983465bf94a4f21bc609826eea2f0ac} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client -> Sending packet 6 (37 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 2c2398ab5c270654, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 63.74µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 8 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client -> Sending packet 7 (39 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 2c2398ab5c270654, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 65.823µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:39 client -> Sending packet 8 (30 bytes) for connection e7a80e3639eb73387cbb80822ffd2fced0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 2c2398ab5c270654, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:39 client Connection e7a80e3639eb73387cbb80822ffd2fced0 closed. 2025/04/30 12:18:39 Requesting https://server4:443/jvwrcjejpq. 2025/04/30 12:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:39 Increased send buffer size to 14336 kiB 2025/04/30 12:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:39 Created qlog file: /logs/qlog/f5de53abf043d4e4523a9f239165307d.sqlog 2025/04/30 12:18:39 client Starting new connection to server4 ([::]:40941 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f5de53abf043d4e4523a9f239165307d, version v1 2025/04/30 12:18:39 Adding connection ID (empty). 2025/04/30 12:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:39 client -> Sending packet 0 (1280 bytes) for connection f5de53abf043d4e4523a9f239165307d, Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: f5de53abf043d4e4523a9f239165307d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:18:39 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:39 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3a49837a1517508a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:39 client Received first packet. Switching destination connection ID to: 3a49837a1517508a 2025/04/30 12:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 12:18:39 client newly acked packets (1): [0] 2025/04/30 12:18:39 client updated RTT: 32.962201ms (σ: 16.4811ms) 2025/04/30 12:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:39 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3a49837a1517508a, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 12:18:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f5de53abf043d4e4523a9f239165307d, InitialSourceConnectionID: 3a49837a1517508a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x450f8b83c3eae5ad534ed55f3ab9f80a, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:39 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 96acf43a229d38b4, StatelessResetToken: 0xdcbbe7c52cbc128614ca419b8e974831} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77a2b29a4f86a89e, StatelessResetToken: 0x18916bf4cf5a47f6b6bb1d1abd5732ac} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0404098940d39ae9, StatelessResetToken: 0xbf5bbaf06a7f31c1d04ca4f170f6988e} 2025/04/30 12:18:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f5de53abf043d4e4523a9f239165307d 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: 96acf43a229d38b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: 96acf43a229d38b4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:39 client Dropping Initial keys. 2025/04/30 12:18:39 client -> Sending packet 1 (89 bytes) for connection f5de53abf043d4e4523a9f239165307d, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: 96acf43a229d38b4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client -> Sending packet 2 (36 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 882.402µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client -> Sending packet 3 (37 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 67.527µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 5 (47 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:39 client Dropping Handshake keys. 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f9389fc98b5552f8, StatelessResetToken: 0x1124390599ca8008da15fe2f5cbca4e5} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client -> Sending packet 4 (39 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 105.438µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:39 client -> Sending packet 6 (29 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:39 client Skipping packet number 5 2025/04/30 12:18:39 client -> Sending packet 7 (46 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:39 client <- Reading packet 9 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.PingFrame{} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client -> Sending packet 8 (41 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 81.673µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 10 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:39 client -> Sending packet 9 (30 bytes) for connection f5de53abf043d4e4523a9f239165307d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: 96acf43a229d38b4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:39 client Connection f5de53abf043d4e4523a9f239165307d closed. 2025/04/30 12:18:39 Requesting https://server4:443/plrnmnnbxc. 2025/04/30 12:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:39 Increased send buffer size to 14336 kiB 2025/04/30 12:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:39 Created qlog file: /logs/qlog/6f9179b3ae40cfb2.sqlog 2025/04/30 12:18:39 client Starting new connection to server4 ([::]:34327 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6f9179b3ae40cfb2, version v1 2025/04/30 12:18:39 Adding connection ID (empty). 2025/04/30 12:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:39 client -> Sending packet 0 (1280 bytes) for connection 6f9179b3ae40cfb2, Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: 6f9179b3ae40cfb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:39 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:39 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 39167436b2a37350, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:39 client Received first packet. Switching destination connection ID to: 39167436b2a37350 2025/04/30 12:18:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344µs} 2025/04/30 12:18:39 client newly acked packets (1): [0] 2025/04/30 12:18:39 client updated RTT: 32.945257ms (σ: 16.472628ms) 2025/04/30 12:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:39 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 39167436b2a37350, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:18:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6f9179b3ae40cfb2, InitialSourceConnectionID: 39167436b2a37350, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa126e733b5a76fc8745d8e93a6b16ca3, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f9179b3ae40cfb2 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: 39167436b2a37350, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: 39167436b2a37350, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client Dropping Initial keys. 2025/04/30 12:18:39 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b51c576d4ec5117d, StatelessResetToken: 0x8aaf6d5abb9d24f27c9e4936f26a852d} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 34d8ec35f3a155b7, StatelessResetToken: 0x6c5dca741cf428d383642f71c44ff3b3} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e021d4d165006bb2, StatelessResetToken: 0xb2d1e8553c0b33e7ba76708b03bd4582} 2025/04/30 12:18:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:39 client -> Sending packet 1 (91 bytes) for connection 6f9179b3ae40cfb2, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: b51c576d4ec5117d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client -> Sending packet 1 (36 bytes) for connection 6f9179b3ae40cfb2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680.55µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:39 client -> Sending packet 2 (74 bytes) for connection 6f9179b3ae40cfb2, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: b51c576d4ec5117d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client -> Sending packet 3 (74 bytes) for connection 6f9179b3ae40cfb2, Handshake 2025/04/30 12:18:39 client Long Header{Type: Handshake, DestConnectionID: b51c576d4ec5117d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:39 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:39 client Dropping Handshake keys. 2025/04/30 12:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:39 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:39 client -> Sending packet 3 (56 bytes) for connection 6f9179b3ae40cfb2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 84.317µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client -> Sending packet 4 (48 bytes) for connection 6f9179b3ae40cfb2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:39 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d70b2e059c653464, StatelessResetToken: 0x4d6512271cf163feedf9ac4c67fa40f7} 2025/04/30 12:18:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:39 client -> Sending packet 5 (37 bytes) for connection 6f9179b3ae40cfb2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 67.216µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:39 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:39 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:39 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:39 client -> Sending packet 6 (37 bytes) for connection 6f9179b3ae40cfb2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 37.39µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:39 client -> Sending packet 7 (30 bytes) for connection 6f9179b3ae40cfb2, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:39 client Short Header{DestConnectionID: b51c576d4ec5117d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:39 client Connection 6f9179b3ae40cfb2 closed. 2025/04/30 12:18:39 Requesting https://server4:443/nobfuaolvu. 2025/04/30 12:18:39 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:39 Increased send buffer size to 14336 kiB 2025/04/30 12:18:39 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:39 Created qlog file: /logs/qlog/9b7607c1c7d71cdd94a21b0d61ad68c11213.sqlog 2025/04/30 12:18:39 client Starting new connection to server4 ([::]:53722 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9b7607c1c7d71cdd94a21b0d61ad68c11213, version v1 2025/04/30 12:18:39 Adding connection ID (empty). 2025/04/30 12:18:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:39 client -> Sending packet 0 (1280 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, Initial 2025/04/30 12:18:39 client Long Header{Type: Initial, DestConnectionID: 9b7607c1c7d71cdd94a21b0d61ad68c11213, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:40 client -> Sending packet 1 (1280 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: 9b7607c1c7d71cdd94a21b0d61ad68c11213, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:40 client -> Sending packet 2 (1280 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: 9b7607c1c7d71cdd94a21b0d61ad68c11213, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:40 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:40 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7ae49c4dd66d94e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:40 client Received first packet. Switching destination connection ID to: f7ae49c4dd66d94e 2025/04/30 12:18:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 376µs} 2025/04/30 12:18:40 client newly acked packets (1): [2] 2025/04/30 12:18:40 client updated RTT: 34.101043ms (σ: 17.050521ms) 2025/04/30 12:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:40 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7ae49c4dd66d94e, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/04/30 12:18:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9b7607c1c7d71cdd94a21b0d61ad68c11213, InitialSourceConnectionID: f7ae49c4dd66d94e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xaf3eec850ac6eec6448f760e89f88ce3, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: f7ae49c4dd66d94e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client Long Header{Type: Handshake, DestConnectionID: f7ae49c4dd66d94e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:40 client Dropping Initial keys. 2025/04/30 12:18:40 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ac7d78fc5bd54e29, StatelessResetToken: 0x62cc9733eb33e7e5bb03187d9700c9aa} 2025/04/30 12:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 94a334d53160da6a, StatelessResetToken: 0x03bbc15d59af43885f1f49e29bdb9711} 2025/04/30 12:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c1190e587490a0af, StatelessResetToken: 0x40808820d5a51ab2f3856502351835e8} 2025/04/30 12:18:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:40 client -> Sending packet 1 (91 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, Handshake 2025/04/30 12:18:40 client Long Header{Type: Handshake, DestConnectionID: ac7d78fc5bd54e29, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client Short Header{DestConnectionID: ac7d78fc5bd54e29, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:40 client -> Sending packet 1 (36 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: ac7d78fc5bd54e29, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 686.298µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:40 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:40 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:40 client -> Sending packet 2 (37 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: ac7d78fc5bd54e29, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 57.117µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:40 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:40 client -> Sending packet 2 (69 bytes) for connection 9b7607c1c7d71cdd94a21b0d61ad68c11213, Handshake 2025/04/30 12:18:40 client Long Header{Type: Handshake, DestConnectionID: ac7d78fc5bd54e29, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:40 client Short Header{DestConnectionID: ac7d78fc5bd54e29, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:40 client Connection 9b7607c1c7d71cdd94a21b0d61ad68c11213 closed. 2025/04/30 12:18:40 Requesting https://server4:443/xmhhligrpy. 2025/04/30 12:18:40 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:40 Increased send buffer size to 14336 kiB 2025/04/30 12:18:40 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:40 Created qlog file: /logs/qlog/73d1627386cb422f2a4d8feda1.sqlog 2025/04/30 12:18:40 client Starting new connection to server4 ([::]:35894 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 73d1627386cb422f2a4d8feda1, version v1 2025/04/30 12:18:40 Adding connection ID (empty). 2025/04/30 12:18:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:40 client -> Sending packet 0 (1280 bytes) for connection 73d1627386cb422f2a4d8feda1, Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: 73d1627386cb422f2a4d8feda1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:18:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:40 client -> Sending packet 1 (1280 bytes) for connection 73d1627386cb422f2a4d8feda1, Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: 73d1627386cb422f2a4d8feda1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:18:40 client -> Sending packet 2 (1280 bytes) for connection 73d1627386cb422f2a4d8feda1, Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: 73d1627386cb422f2a4d8feda1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:18:40 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:40 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3505b7709a43138e, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:40 client Received first packet. Switching destination connection ID to: 3505b7709a43138e 2025/04/30 12:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client -> Sending packet 3 (1280 bytes) for connection 73d1627386cb422f2a4d8feda1, Initial 2025/04/30 12:18:40 client Long Header{Type: Initial, DestConnectionID: 3505b7709a43138e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:40 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/04/30 12:18:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3505b7709a43138e, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 12:18:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:18:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 73d1627386cb422f2a4d8feda1, InitialSourceConnectionID: 3505b7709a43138e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x4c01e5e042a5b7eec28db22814d53d0e, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:40 client -> Sending packet 0 (82 bytes) for connection 73d1627386cb422f2a4d8feda1, Handshake 2025/04/30 12:18:40 client Long Header{Type: Handshake, DestConnectionID: 3505b7709a43138e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:40 client Dropping Initial keys. 2025/04/30 12:18:40 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 998e4c4755bb318b, StatelessResetToken: 0xc634d43c872e006737bfabb450c2e492} 2025/04/30 12:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27ac37b09918b17b, StatelessResetToken: 0xb30c896a4fe07e2fb0d8f5b49f852f4d} 2025/04/30 12:18:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a239e42bc122220d, StatelessResetToken: 0x2ee1b380921332a8d469c2740e54accb} 2025/04/30 12:18:40 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:40 client -> Sending packet 0 (59 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 340.764968ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:40 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:40 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:40 client Dropping Handshake keys. 2025/04/30 12:18:40 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:40 client -> Sending packet 1 (1366 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.PingFrame{} 2025/04/30 12:18:40 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:40 client -> Sending packet 2 (36 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.308758ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:40 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:40 client -> Sending packet 4 (48 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:40 client -> Sending packet 5 (48 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:40 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 12:18:41 client -> Sending packet 7 (48 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client -> Sending packet 8 (48 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client <- Reading packet 2 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 799f9831e5570ca9, StatelessResetToken: 0xed676544e293de9214e36bc8f7429fd1} 2025/04/30 12:18:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:41 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:41 client -> Sending packet 9 (37 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 62.718µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 7 (29 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 26.576ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client newly acked packets (1): [8] 2025/04/30 12:18:41 client updated RTT: 57.358563ms (σ: 28.679281ms) 2025/04/30 12:18:41 client ECN capability confirmed. 2025/04/30 12:18:41 client lost packet 1 (time threshold) 2025/04/30 12:18:41 client Canceling loss detection timer. 2025/04/30 12:18:41 client -> Sending packet 10 (1323 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.PingFrame{} 2025/04/30 12:18:41 client <- Reading packet 9 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, DelayTime: 26.216ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client newly acked packets (1): [10] 2025/04/30 12:18:41 client updated RTT: 57.422ms (σ: 21.638ms) 2025/04/30 12:18:41 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.PingFrame{} 2025/04/30 12:18:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:41 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:41 client -> Sending packet 11 (40 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 25.25253ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 12 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:41 client -> Sending packet 12 (41 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 78.417µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:41 client -> Sending packet 13 (30 bytes) for connection 73d1627386cb422f2a4d8feda1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 998e4c4755bb318b, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:41 client Connection 73d1627386cb422f2a4d8feda1 closed. 2025/04/30 12:18:41 Requesting https://server4:443/sdxqqzorke. 2025/04/30 12:18:41 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:41 Increased send buffer size to 14336 kiB 2025/04/30 12:18:41 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:41 Created qlog file: /logs/qlog/45b28b889b1798db7575.sqlog 2025/04/30 12:18:41 client Starting new connection to server4 ([::]:48329 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 45b28b889b1798db7575, version v1 2025/04/30 12:18:41 Adding connection ID (empty). 2025/04/30 12:18:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:41 client -> Sending packet 0 (1280 bytes) for connection 45b28b889b1798db7575, Initial 2025/04/30 12:18:41 client Long Header{Type: Initial, DestConnectionID: 45b28b889b1798db7575, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:41 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:41 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cd7350410bc02655, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:41 client Received first packet. Switching destination connection ID to: cd7350410bc02655 2025/04/30 12:18:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 448µs} 2025/04/30 12:18:41 client newly acked packets (1): [0] 2025/04/30 12:18:41 client updated RTT: 33.093247ms (σ: 16.546623ms) 2025/04/30 12:18:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:41 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:41 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cd7350410bc02655, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 45b28b889b1798db7575, InitialSourceConnectionID: cd7350410bc02655, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x821382f09eb5948e9844a559f26a93ed, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:41 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c66fbcf1790b219, StatelessResetToken: 0xdb6da9dd1839c80510f0250ac9103271} 2025/04/30 12:18:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b646047b465a256, StatelessResetToken: 0x2a25f5982632480fe55ef9215a51fe2e} 2025/04/30 12:18:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c03c189cc6051c3f, StatelessResetToken: 0xb06c679377dde73bd1b24871f642d831} 2025/04/30 12:18:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 45b28b889b1798db7575 2025/04/30 12:18:41 client Long Header{Type: Initial, DestConnectionID: 8c66fbcf1790b219, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client Long Header{Type: Handshake, DestConnectionID: 8c66fbcf1790b219, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client Dropping Initial keys. 2025/04/30 12:18:41 client -> Sending packet 1 (43 bytes) for connection 45b28b889b1798db7575, Handshake 2025/04/30 12:18:41 client Long Header{Type: Handshake, DestConnectionID: 8c66fbcf1790b219, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client -> Sending packet 1 (36 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 869.066µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:41 client Dropping Handshake keys. 2025/04/30 12:18:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:41 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00f24a322a38747f, StatelessResetToken: 0x393a268964972d9bc78325cc562c85f4} 2025/04/30 12:18:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:41 client -> Sending packet 2 (35 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 49.071µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:41 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:41 client -> Sending packet 3 (36 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.210712ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:41 client -> Sending packet 5 (48 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client -> Sending packet 6 (48 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client <- Reading packet 6 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.PingFrame{} 2025/04/30 12:18:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:41 client -> Sending packet 7 (37 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 76.163µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 7 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.PingFrame{} 2025/04/30 12:18:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:41 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:41 client -> Sending packet 8 (38 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 25.259652ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 11 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.PingFrame{} 2025/04/30 12:18:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:41 client <- Reading packet 12 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.PingFrame{} 2025/04/30 12:18:41 client -> Sending packet 9 (1366 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.PingFrame{} 2025/04/30 12:18:41 client -> Sending packet 10 (39 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 130.254µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client <- Reading packet 13 (37 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:41 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:41 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client newly acked packets (1): [9] 2025/04/30 12:18:41 client ECN capability confirmed. 2025/04/30 12:18:41 client lost packet 6 (time threshold) 2025/04/30 12:18:41 client Canceling loss detection timer. 2025/04/30 12:18:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:41 client -> Sending packet 11 (60 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 231.762µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:41 client -> Sending packet 12 (30 bytes) for connection 45b28b889b1798db7575, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:41 client Short Header{DestConnectionID: 8c66fbcf1790b219, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:41 client Connection 45b28b889b1798db7575 closed. 2025/04/30 12:18:41 Requesting https://server4:443/hkxrxzkhjp. 2025/04/30 12:18:41 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:41 Increased send buffer size to 14336 kiB 2025/04/30 12:18:41 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:41 Created qlog file: /logs/qlog/07239445387ed475ccd4e700.sqlog 2025/04/30 12:18:41 client Starting new connection to server4 ([::]:60889 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 07239445387ed475ccd4e700, version v1 2025/04/30 12:18:41 Adding connection ID (empty). 2025/04/30 12:18:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:41 client -> Sending packet 0 (1280 bytes) for connection 07239445387ed475ccd4e700, Initial 2025/04/30 12:18:41 client Long Header{Type: Initial, DestConnectionID: 07239445387ed475ccd4e700, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:42 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:42 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d73af1980bb256c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:42 client Received first packet. Switching destination connection ID to: 9d73af1980bb256c 2025/04/30 12:18:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 12:18:42 client newly acked packets (1): [0] 2025/04/30 12:18:42 client updated RTT: 33.064399ms (σ: 16.532199ms) 2025/04/30 12:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:42 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9d73af1980bb256c, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:18:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 07239445387ed475ccd4e700, InitialSourceConnectionID: 9d73af1980bb256c, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x19791a8329c0ca0ede608fe8cde56f32, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 07239445387ed475ccd4e700 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: 9d73af1980bb256c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 9d73af1980bb256c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client Dropping Initial keys. 2025/04/30 12:18:42 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: db3e9acbdcd8ae5e, StatelessResetToken: 0x72473835645f608af20e0071eb3e9257} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 94b989cb13f5163a, StatelessResetToken: 0x464651028602d7903aea7dc84c03acea} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce6b27fe7d22898c, StatelessResetToken: 0x0d30d0e995254a3cfb0f76c9b30857c6} 2025/04/30 12:18:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:42 client -> Sending packet 1 (91 bytes) for connection 07239445387ed475ccd4e700, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: db3e9acbdcd8ae5e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Short Header{DestConnectionID: db3e9acbdcd8ae5e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:42 client -> Sending packet 1 (36 bytes) for connection 07239445387ed475ccd4e700, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: db3e9acbdcd8ae5e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 831.918µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:42 client -> Sending packet 2 (74 bytes) for connection 07239445387ed475ccd4e700, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: db3e9acbdcd8ae5e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client -> Sending packet 3 (74 bytes) for connection 07239445387ed475ccd4e700, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: db3e9acbdcd8ae5e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:42 client Dropping Handshake keys. 2025/04/30 12:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:42 client -> Sending packet 3 (56 bytes) for connection 07239445387ed475ccd4e700, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: db3e9acbdcd8ae5e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 85.971µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:42 client -> Sending packet 4 (48 bytes) for connection 07239445387ed475ccd4e700, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: db3e9acbdcd8ae5e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:42 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client newly acked packets (1): [4] 2025/04/30 12:18:42 client updated RTT: 32.788ms (σ: 12.951ms) 2025/04/30 12:18:42 client ECN capability confirmed. 2025/04/30 12:18:42 client Canceling loss detection timer. 2025/04/30 12:18:42 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 438f8529a9cf12fd, StatelessResetToken: 0xe752d87e60174eb7c44293e1000fc16e} 2025/04/30 12:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:42 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:42 client -> Sending packet 5 (35 bytes) for connection 07239445387ed475ccd4e700, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: db3e9acbdcd8ae5e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 93.582µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:42 client -> Sending packet 6 (30 bytes) for connection 07239445387ed475ccd4e700, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: db3e9acbdcd8ae5e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:42 client Connection 07239445387ed475ccd4e700 closed. 2025/04/30 12:18:42 Requesting https://server4:443/qjknjorztf. 2025/04/30 12:18:42 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:42 Increased send buffer size to 14336 kiB 2025/04/30 12:18:42 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:42 Created qlog file: /logs/qlog/a58783f570c01f128b9d4a1c.sqlog 2025/04/30 12:18:42 client Starting new connection to server4 ([::]:36876 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a58783f570c01f128b9d4a1c, version v1 2025/04/30 12:18:42 Adding connection ID (empty). 2025/04/30 12:18:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:42 client -> Sending packet 0 (1280 bytes) for connection a58783f570c01f128b9d4a1c, Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: a58783f570c01f128b9d4a1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:42 client -> Sending packet 1 (1280 bytes) for connection a58783f570c01f128b9d4a1c, Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: a58783f570c01f128b9d4a1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:42 client -> Sending packet 2 (1280 bytes) for connection a58783f570c01f128b9d4a1c, Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: a58783f570c01f128b9d4a1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 12:18:42 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:42 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35bd657900d60473, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:42 client Received first packet. Switching destination connection ID to: 35bd657900d60473 2025/04/30 12:18:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 360µs} 2025/04/30 12:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:42 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35bd657900d60473, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:18:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a58783f570c01f128b9d4a1c, InitialSourceConnectionID: 35bd657900d60473, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x3e613a24cd02228dc4bccd34c777488c, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:42 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c576064715e0ef4, StatelessResetToken: 0xe630fb027e9d94e1981ec9e152d65df8} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d35f83d9f6d7883a, StatelessResetToken: 0xb5eeacaae81fe55a7603056c6823e6ab} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c0167a007f70dfa7, StatelessResetToken: 0x73658ca53ceeadd7e2322a51651df711} 2025/04/30 12:18:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a58783f570c01f128b9d4a1c 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: 1c576064715e0ef4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 1c576064715e0ef4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:42 client Dropping Initial keys. 2025/04/30 12:18:42 client -> Sending packet 1 (89 bytes) for connection a58783f570c01f128b9d4a1c, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 1c576064715e0ef4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:42 client -> Sending packet 2 (36 bytes) for connection a58783f570c01f128b9d4a1c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 888.092µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:42 client Dropping Handshake keys. 2025/04/30 12:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:42 client -> Sending packet 3 (1366 bytes) for connection a58783f570c01f128b9d4a1c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.PingFrame{} 2025/04/30 12:18:42 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f01a5f474f08f20b, StatelessResetToken: 0x0739c5365bfb10025584243c41fe9fe0} 2025/04/30 12:18:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:42 client -> Sending packet 4 (35 bytes) for connection a58783f570c01f128b9d4a1c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 52.317µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client <- Reading packet 3 (29 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 26.216ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client newly acked packets (1): [0] 2025/04/30 12:18:42 client lost packet 1 (time threshold) 2025/04/30 12:18:42 client Canceling loss detection timer. 2025/04/30 12:18:42 client -> Sending packet 5 (46 bytes) for connection a58783f570c01f128b9d4a1c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:42 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:42 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:42 client -> Sending packet 6 (37 bytes) for connection a58783f570c01f128b9d4a1c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 0}}, DelayTime: 73.056µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client <- Reading packet 7 (29 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 26.52ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client newly acked packets (2): [3 5] 2025/04/30 12:18:42 client updated RTT: 57.09106ms (σ: 28.54553ms) 2025/04/30 12:18:42 client ECN capability confirmed. 2025/04/30 12:18:42 client Canceling loss detection timer. 2025/04/30 12:18:42 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:42 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:42 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:42 client -> Sending packet 7 (30 bytes) for connection a58783f570c01f128b9d4a1c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 1c576064715e0ef4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:42 client Connection a58783f570c01f128b9d4a1c closed. 2025/04/30 12:18:42 Requesting https://server4:443/qxzzkxdgfy. 2025/04/30 12:18:42 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:42 Increased send buffer size to 14336 kiB 2025/04/30 12:18:42 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:42 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:42 Created qlog file: /logs/qlog/51b3d7f211af085173cc.sqlog 2025/04/30 12:18:42 client Starting new connection to server4 ([::]:42597 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 51b3d7f211af085173cc, version v1 2025/04/30 12:18:42 Adding connection ID (empty). 2025/04/30 12:18:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:42 client -> Sending packet 0 (1280 bytes) for connection 51b3d7f211af085173cc, Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: 51b3d7f211af085173cc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 12:18:42 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:42 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b1b79d0b9b3658e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:42 client Received first packet. Switching destination connection ID to: 3b1b79d0b9b3658e 2025/04/30 12:18:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/04/30 12:18:42 client newly acked packets (1): [0] 2025/04/30 12:18:42 client updated RTT: 32.936126ms (σ: 16.468063ms) 2025/04/30 12:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:42 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3b1b79d0b9b3658e, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 51b3d7f211af085173cc, InitialSourceConnectionID: 3b1b79d0b9b3658e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xaa5432265c4f219364613238daecbdd2, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:42 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 75b187daca74e157, StatelessResetToken: 0x3a2ce3a4c53e40fea2830f38ebf25876} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5baacb6b40373fb6, StatelessResetToken: 0x2b892e9a57d9598d2989fb14249ed70e} 2025/04/30 12:18:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7381ca2d3ce3944, StatelessResetToken: 0xf5d8bd2b4e575918cc2d785c0ffa2572} 2025/04/30 12:18:42 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 51b3d7f211af085173cc 2025/04/30 12:18:42 client Long Header{Type: Initial, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:42 client Dropping Initial keys. 2025/04/30 12:18:42 client -> Sending packet 1 (89 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:42 client -> Sending packet 2 (36 bytes) for connection 51b3d7f211af085173cc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:42 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 803.073µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:42 client -> Sending packet 2 (74 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client -> Sending packet 3 (74 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:18:42 client -> Sending packet 4 (74 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:42 client -> Sending packet 5 (74 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:42 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 12:18:43 client -> Sending packet 6 (74 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:43 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:43 client -> Sending packet 7 (74 bytes) for connection 51b3d7f211af085173cc, Handshake 2025/04/30 12:18:43 client Long Header{Type: Handshake, DestConnectionID: 75b187daca74e157, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:43 client <- Reading packet 4 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 75b187daca74e157, StatelessResetToken: 0x3a2ce3a4c53e40fea2830f38ebf25876} 2025/04/30 12:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5baacb6b40373fb6, StatelessResetToken: 0x2b892e9a57d9598d2989fb14249ed70e} 2025/04/30 12:18:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7381ca2d3ce3944, StatelessResetToken: 0xf5d8bd2b4e575918cc2d785c0ffa2572} 2025/04/30 12:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:43 client <- Reading packet 5 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:43 client Dropping Handshake keys. 2025/04/30 12:18:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:43 client -> Sending packet 4 (39 bytes) for connection 51b3d7f211af085173cc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 155.041µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:43 client Skipping packet number 3 2025/04/30 12:18:43 client -> Sending packet 5 (46 bytes) for connection 51b3d7f211af085173cc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:43 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:43 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:43 client -> Sending packet 6 (39 bytes) for connection 51b3d7f211af085173cc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 76.293µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:43 client <- Reading packet 8 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:43 client -> Sending packet 7 (30 bytes) for connection 51b3d7f211af085173cc, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 75b187daca74e157, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:43 client Connection 51b3d7f211af085173cc closed. 2025/04/30 12:18:43 Requesting https://server4:443/ddtfczmuqh. 2025/04/30 12:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:43 Increased send buffer size to 14336 kiB 2025/04/30 12:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:43 Created qlog file: /logs/qlog/2bebb1dd84b9668f4a1cae.sqlog 2025/04/30 12:18:43 client Starting new connection to server4 ([::]:47297 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2bebb1dd84b9668f4a1cae, version v1 2025/04/30 12:18:43 Adding connection ID (empty). 2025/04/30 12:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:43 client -> Sending packet 0 (1280 bytes) for connection 2bebb1dd84b9668f4a1cae, Initial 2025/04/30 12:18:43 client Long Header{Type: Initial, DestConnectionID: 2bebb1dd84b9668f4a1cae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 12:18:43 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:43 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2fa3a4f71e86fd1f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:43 client Received first packet. Switching destination connection ID to: 2fa3a4f71e86fd1f 2025/04/30 12:18:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 12:18:43 client newly acked packets (1): [0] 2025/04/30 12:18:43 client updated RTT: 33.000363ms (σ: 16.500181ms) 2025/04/30 12:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:43 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:43 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2fa3a4f71e86fd1f, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2bebb1dd84b9668f4a1cae, InitialSourceConnectionID: 2fa3a4f71e86fd1f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x2de65ea559774e0f83628462d706c1ee, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2bebb1dd84b9668f4a1cae 2025/04/30 12:18:43 client Long Header{Type: Initial, DestConnectionID: 2fa3a4f71e86fd1f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:43 client Long Header{Type: Handshake, DestConnectionID: 2fa3a4f71e86fd1f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:43 client Dropping Initial keys. 2025/04/30 12:18:43 client -> Sending packet 1 (89 bytes) for connection 2bebb1dd84b9668f4a1cae, Handshake 2025/04/30 12:18:43 client Long Header{Type: Handshake, DestConnectionID: 2fa3a4f71e86fd1f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:43 client Short Header{DestConnectionID: 2fa3a4f71e86fd1f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:43 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:43 client Dropping Handshake keys. 2025/04/30 12:18:43 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:43 client -> Sending packet 1 (35 bytes) for connection 2bebb1dd84b9668f4a1cae, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 2fa3a4f71e86fd1f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 54.402µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:43 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:43 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:43 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:43 client -> Sending packet 2 (35 bytes) for connection 2bebb1dd84b9668f4a1cae, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 2fa3a4f71e86fd1f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 35.6µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:43 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:43 client -> Sending packet 3 (30 bytes) for connection 2bebb1dd84b9668f4a1cae, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:43 client Short Header{DestConnectionID: 2fa3a4f71e86fd1f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:43 client Connection 2bebb1dd84b9668f4a1cae closed. 2025/04/30 12:18:43 Requesting https://server4:443/anbbjivame. 2025/04/30 12:18:43 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:43 Increased send buffer size to 14336 kiB 2025/04/30 12:18:43 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:43 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:43 Created qlog file: /logs/qlog/9c0a6f1abc0aabde3f7ae4779bdb9ffe.sqlog 2025/04/30 12:18:43 client Starting new connection to server4 ([::]:48872 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9c0a6f1abc0aabde3f7ae4779bdb9ffe, version v1 2025/04/30 12:18:43 Adding connection ID (empty). 2025/04/30 12:18:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:43 client -> Sending packet 0 (1280 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, Initial 2025/04/30 12:18:43 client Long Header{Type: Initial, DestConnectionID: 9c0a6f1abc0aabde3f7ae4779bdb9ffe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:43 client -> Sending packet 1 (1280 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, Initial 2025/04/30 12:18:43 client Long Header{Type: Initial, DestConnectionID: 9c0a6f1abc0aabde3f7ae4779bdb9ffe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:43 client -> Sending packet 2 (1280 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, Initial 2025/04/30 12:18:43 client Long Header{Type: Initial, DestConnectionID: 9c0a6f1abc0aabde3f7ae4779bdb9ffe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 12:18:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:44 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:44 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d8ea4ddcd0c329a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:44 client Received first packet. Switching destination connection ID to: 8d8ea4ddcd0c329a 2025/04/30 12:18:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 464µs} 2025/04/30 12:18:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:44 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:44 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:44 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d8ea4ddcd0c329a, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/04/30 12:18:44 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:44 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:44 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9c0a6f1abc0aabde3f7ae4779bdb9ffe, InitialSourceConnectionID: 8d8ea4ddcd0c329a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x789360d92fd77abac7831be2a11a4a9a, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:44 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe 2025/04/30 12:18:44 client Long Header{Type: Initial, DestConnectionID: 8d8ea4ddcd0c329a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:44 client Long Header{Type: Handshake, DestConnectionID: 8d8ea4ddcd0c329a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:44 client Dropping Initial keys. 2025/04/30 12:18:44 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 496b99814e7aac51, StatelessResetToken: 0x30c4f6a97f580cb6b4a61f4c17d03ca5} 2025/04/30 12:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25d71bfbd06c7880, StatelessResetToken: 0xb1a116707e8d19b60d6a2220176d5edd} 2025/04/30 12:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bcc5c7451b08feb8, StatelessResetToken: 0xd56e08228232dde3509b0904c7bf6374} 2025/04/30 12:18:44 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:44 client -> Sending packet 1 (91 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, Handshake 2025/04/30 12:18:44 client Long Header{Type: Handshake, DestConnectionID: 496b99814e7aac51, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:44 client -> Sending packet 1 (36 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 670.497µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:44 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:44 client Dropping Handshake keys. 2025/04/30 12:18:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:44 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c9adc95db1636b91, StatelessResetToken: 0xc93af7d49c7ca60b82bf71bb3f2a3270} 2025/04/30 12:18:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:44 client -> Sending packet 2 (1366 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.PingFrame{} 2025/04/30 12:18:44 client -> Sending packet 3 (35 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 204.784µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:44 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:44 client -> Sending packet 4 (37 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 66.494µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:44 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 26.648ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:44 client newly acked packets (1): [0] 2025/04/30 12:18:44 client Canceling loss detection timer. 2025/04/30 12:18:44 client <- Reading packet 8 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.PingFrame{} 2025/04/30 12:18:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:44 client <- Reading packet 9 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.PingFrame{} 2025/04/30 12:18:44 client -> Sending packet 5 (39 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 95.879µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:44 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.PingFrame{} 2025/04/30 12:18:44 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:44 client <- Reading packet 11 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.PingFrame{} 2025/04/30 12:18:44 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:44 client -> Sending packet 6 (39 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 134.882µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 12:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:44 client <- Reading packet 13 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:44 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:44 client <- &wire.PingFrame{} 2025/04/30 12:18:44 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:44 client -> Sending packet 7 (41 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:44 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:44 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 80.941µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 12:18:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:45 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:45 client <- Reading packet 14 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.PingFrame{} 2025/04/30 12:18:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:45 client <- Reading packet 15 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.PingFrame{} 2025/04/30 12:18:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:45 client -> Sending packet 8 (41 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:45 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 0, AckRanges: {{Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 121.778µs, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client <- Reading packet 17 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.PingFrame{} 2025/04/30 12:18:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:45 client -> Sending packet 9 (43 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:45 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 64.731µs, ECT0: 13, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client <- Reading packet 19 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:45 client -> Sending packet 10 (45 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:45 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 0, AckRanges: {{Largest: 19, Smallest: 19}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 13}, {Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 84.207µs, ECT0: 14, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:45 client -> Sending packet 11 (30 bytes) for connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe, 1-RTT (ECN: Not-ECT) 2025/04/30 12:18:45 client Short Header{DestConnectionID: 496b99814e7aac51, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:45 client Connection 9c0a6f1abc0aabde3f7ae4779bdb9ffe closed. 2025/04/30 12:18:45 Requesting https://server4:443/motscjsvyk. 2025/04/30 12:18:45 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:45 Increased send buffer size to 14336 kiB 2025/04/30 12:18:45 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:45 Created qlog file: /logs/qlog/75eebaa4fe1e863471db.sqlog 2025/04/30 12:18:45 client Starting new connection to server4 ([::]:55928 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 75eebaa4fe1e863471db, version v1 2025/04/30 12:18:45 Adding connection ID (empty). 2025/04/30 12:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:45 client -> Sending packet 0 (1280 bytes) for connection 75eebaa4fe1e863471db, Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: 75eebaa4fe1e863471db, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:45 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:45 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e703bf1c3940a933, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:45 client Received first packet. Switching destination connection ID to: e703bf1c3940a933 2025/04/30 12:18:45 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 12:18:45 client newly acked packets (1): [0] 2025/04/30 12:18:45 client updated RTT: 33.001963ms (σ: 16.500981ms) 2025/04/30 12:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:45 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:45 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e703bf1c3940a933, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 75eebaa4fe1e863471db, InitialSourceConnectionID: e703bf1c3940a933, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xf630758e1ccca862432135b8b9e48e64, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 75eebaa4fe1e863471db 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: e703bf1c3940a933, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client Long Header{Type: Handshake, DestConnectionID: e703bf1c3940a933, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:45 client Dropping Initial keys. 2025/04/30 12:18:45 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f2adfdebf952df83, StatelessResetToken: 0x18f6e61f901a391d65cd5b9083ad8ab4} 2025/04/30 12:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 37026a2f8c70320c, StatelessResetToken: 0x139d2271d0793e7875938ffdc06cc92d} 2025/04/30 12:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c5eeca30fc1300c, StatelessResetToken: 0x736a33f76ad7c9141d9b5623271a8990} 2025/04/30 12:18:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:45 client -> Sending packet 1 (91 bytes) for connection 75eebaa4fe1e863471db, Handshake 2025/04/30 12:18:45 client Long Header{Type: Handshake, DestConnectionID: f2adfdebf952df83, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client Short Header{DestConnectionID: f2adfdebf952df83, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:45 client -> Sending packet 1 (36 bytes) for connection 75eebaa4fe1e863471db, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:45 client Short Header{DestConnectionID: f2adfdebf952df83, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 740.853µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4c1e9a038984f8b4, StatelessResetToken: 0x3f069ed7385b6efde0c16430a744fb00} 2025/04/30 12:18:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:45 client -> Sending packet 2 (37 bytes) for connection 75eebaa4fe1e863471db, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:45 client Short Header{DestConnectionID: f2adfdebf952df83, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80.02µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:45 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:45 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:45 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:45 client -> Sending packet 3 (37 bytes) for connection 75eebaa4fe1e863471db, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:45 client Short Header{DestConnectionID: f2adfdebf952df83, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 35.446µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:45 client -> Sending packet 2 (69 bytes) for connection 75eebaa4fe1e863471db, Handshake 2025/04/30 12:18:45 client Long Header{Type: Handshake, DestConnectionID: f2adfdebf952df83, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:45 client Short Header{DestConnectionID: f2adfdebf952df83, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:45 client Connection 75eebaa4fe1e863471db closed. 2025/04/30 12:18:45 Requesting https://server4:443/tadeehrlea. 2025/04/30 12:18:45 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:45 Increased send buffer size to 14336 kiB 2025/04/30 12:18:45 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:45 Created qlog file: /logs/qlog/d308b72cc26b8a220c6845521b9205ebd592e1.sqlog 2025/04/30 12:18:45 client Starting new connection to server4 ([::]:41778 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d308b72cc26b8a220c6845521b9205ebd592e1, version v1 2025/04/30 12:18:45 Adding connection ID (empty). 2025/04/30 12:18:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:45 client -> Sending packet 0 (1280 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: d308b72cc26b8a220c6845521b9205ebd592e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:18:45 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:45 client -> Sending packet 1 (1280 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: d308b72cc26b8a220c6845521b9205ebd592e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:18:45 client -> Sending packet 2 (1280 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: d308b72cc26b8a220c6845521b9205ebd592e1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 12:18:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:18:45 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a1c41ffe8cf02186, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:45 client Received first packet. Switching destination connection ID to: a1c41ffe8cf02186 2025/04/30 12:18:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:45 client -> Sending packet 3 (1280 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Initial 2025/04/30 12:18:45 client Long Header{Type: Initial, DestConnectionID: a1c41ffe8cf02186, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:45 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:45 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:46 client -> Sending packet 4 (1280 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: a1c41ffe8cf02186, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:18:46 client -> Sending packet 5 (1280 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: a1c41ffe8cf02186, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 12:18:46 client <- Reading packet 1 (777 bytes) for connection (empty), Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a1c41ffe8cf02186, PacketNumber: 1, PacketNumberLen: 1, Length: 760, Version: v1} 2025/04/30 12:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:18:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d308b72cc26b8a220c6845521b9205ebd592e1, InitialSourceConnectionID: a1c41ffe8cf02186, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x6cf602be8d09f1ab0c8c28d440f3c0fa, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:46 client -> Sending packet 0 (82 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: a1c41ffe8cf02186, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:46 client Dropping Initial keys. 2025/04/30 12:18:46 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15adf25b0f7553cb, StatelessResetToken: 0x0f9277692187b6aa823462a7c489698d} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 279cf368f401a267, StatelessResetToken: 0x33ef0a6ffa57d2acb54f86220e986fd3} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd8f62fd07d91beb, StatelessResetToken: 0x1d723bbd41d9fe867ee5b0740757f311} 2025/04/30 12:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:46 client -> Sending packet 0 (59 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 15adf25b0f7553cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600.44551ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:46 client Dropping %!s(logging.PacketType=0) packet (42 bytes) because we already dropped the keys. 2025/04/30 12:18:46 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: feb5fb12406a4b2a, StatelessResetToken: 0x0e07648339b3094751b98defbce4c871} 2025/04/30 12:18:46 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:46 client -> Sending packet 1 (37 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 15adf25b0f7553cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 62.507µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:46 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:46 client -> Sending packet 2 (37 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 15adf25b0f7553cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 63.729µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:46 client -> Sending packet 1 (69 bytes) for connection d308b72cc26b8a220c6845521b9205ebd592e1, Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: 15adf25b0f7553cb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:46 client Short Header{DestConnectionID: 15adf25b0f7553cb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:46 client Connection d308b72cc26b8a220c6845521b9205ebd592e1 closed. 2025/04/30 12:18:46 Requesting https://server4:443/xqppwmuits. 2025/04/30 12:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:46 Increased send buffer size to 14336 kiB 2025/04/30 12:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:46 Created qlog file: /logs/qlog/68946f90f1f668b706056070.sqlog 2025/04/30 12:18:46 client Starting new connection to server4 ([::]:44330 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 68946f90f1f668b706056070, version v1 2025/04/30 12:18:46 Adding connection ID (empty). 2025/04/30 12:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:46 client -> Sending packet 0 (1280 bytes) for connection 68946f90f1f668b706056070, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: 68946f90f1f668b706056070, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:46 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:46 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d51879c3ecd54596, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:46 client Received first packet. Switching destination connection ID to: d51879c3ecd54596 2025/04/30 12:18:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/04/30 12:18:46 client newly acked packets (1): [0] 2025/04/30 12:18:46 client updated RTT: 32.948903ms (σ: 16.474451ms) 2025/04/30 12:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:46 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d51879c3ecd54596, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 68946f90f1f668b706056070, InitialSourceConnectionID: d51879c3ecd54596, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x65420765d42b208b09826b66167de4e2, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68946f90f1f668b706056070 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: d51879c3ecd54596, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: d51879c3ecd54596, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:46 client Dropping Initial keys. 2025/04/30 12:18:46 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 72df6a0aff528db2, StatelessResetToken: 0x14dbf1fa8106265989d6c686a93318e0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 58cc579f94274ddc, StatelessResetToken: 0x1933c8d49fcb6d9777325b31620afde2} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 319325c879e27a24, StatelessResetToken: 0x96a9c1df0e0a2ea23885afd3c7561f62} 2025/04/30 12:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:46 client -> Sending packet 1 (91 bytes) for connection 68946f90f1f668b706056070, Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: 72df6a0aff528db2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client Short Header{DestConnectionID: 72df6a0aff528db2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:46 client -> Sending packet 1 (36 bytes) for connection 68946f90f1f668b706056070, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 72df6a0aff528db2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 731.087µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:46 client Dropping Handshake keys. 2025/04/30 12:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:46 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:46 client -> Sending packet 2 (36 bytes) for connection 68946f90f1f668b706056070, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 72df6a0aff528db2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.245707ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.584ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client newly acked packets (1): [0] 2025/04/30 12:18:46 client Canceling loss detection timer. 2025/04/30 12:18:46 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4978ff07e22cb6df, StatelessResetToken: 0x2efd922925cfbd0fe232a0b55594acaa} 2025/04/30 12:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:46 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4978ff07e22cb6df, StatelessResetToken: 0x2efd922925cfbd0fe232a0b55594acaa} 2025/04/30 12:18:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:46 client -> Sending packet 3 (37 bytes) for connection 68946f90f1f668b706056070, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 72df6a0aff528db2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 114.866µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:46 client -> Sending packet 4 (30 bytes) for connection 68946f90f1f668b706056070, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 72df6a0aff528db2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:46 client Connection 68946f90f1f668b706056070 closed. 2025/04/30 12:18:46 Requesting https://server4:443/lrdhcpxetz. 2025/04/30 12:18:46 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:46 Increased send buffer size to 14336 kiB 2025/04/30 12:18:46 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:46 Created qlog file: /logs/qlog/4bcb4edf2fe3582d6b491733.sqlog 2025/04/30 12:18:46 client Starting new connection to server4 ([::]:43123 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4bcb4edf2fe3582d6b491733, version v1 2025/04/30 12:18:46 Adding connection ID (empty). 2025/04/30 12:18:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:46 client -> Sending packet 0 (1280 bytes) for connection 4bcb4edf2fe3582d6b491733, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: 4bcb4edf2fe3582d6b491733, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:18:46 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:46 client -> Sending packet 1 (1280 bytes) for connection 4bcb4edf2fe3582d6b491733, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: 4bcb4edf2fe3582d6b491733, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:18:46 client -> Sending packet 2 (1280 bytes) for connection 4bcb4edf2fe3582d6b491733, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: 4bcb4edf2fe3582d6b491733, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 12:18:46 client <- Reading packet 1 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 458024616d0443ff, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:46 client Received first packet. Switching destination connection ID to: 458024616d0443ff 2025/04/30 12:18:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 12:18:46 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 458024616d0443ff, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client -> Sending packet 3 (1280 bytes) for connection 4bcb4edf2fe3582d6b491733, Initial 2025/04/30 12:18:46 client Long Header{Type: Initial, DestConnectionID: 458024616d0443ff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:46 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 458024616d0443ff, PacketNumber: 1, PacketNumberLen: 1, Length: 753, Version: v1} 2025/04/30 12:18:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:18:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4bcb4edf2fe3582d6b491733, InitialSourceConnectionID: 458024616d0443ff, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xdcab96be9e3b70dcc334b669f4023296, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:46 client -> Sending packet 0 (82 bytes) for connection 4bcb4edf2fe3582d6b491733, Handshake 2025/04/30 12:18:46 client Long Header{Type: Handshake, DestConnectionID: 458024616d0443ff, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:46 client Dropping Initial keys. 2025/04/30 12:18:46 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2907173c8c6a108c, StatelessResetToken: 0x94d4177a2120cfbbbdbbc2d5d4ccc9a3} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f76d79993824b43b, StatelessResetToken: 0x42adaa483c3497c28e2a44617ad734ac} 2025/04/30 12:18:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9a5d7804eda0faef, StatelessResetToken: 0xaeb87083779516dc4cf3aa7dfed726c6} 2025/04/30 12:18:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:46 client -> Sending packet 0 (59 bytes) for connection 4bcb4edf2fe3582d6b491733, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:46 client Short Header{DestConnectionID: 2907173c8c6a108c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 340.812828ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:47 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:47 client -> Sending packet 1 (74 bytes) for connection 4bcb4edf2fe3582d6b491733, Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: 2907173c8c6a108c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:47 client -> Sending packet 2 (74 bytes) for connection 4bcb4edf2fe3582d6b491733, Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: 2907173c8c6a108c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:47 client <- Reading packet 4 (770 bytes) for connection (empty), Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 458024616d0443ff, PacketNumber: 4, PacketNumberLen: 1, Length: 753, Version: v1} 2025/04/30 12:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:18:47 client -> Sending packet 3 (45 bytes) for connection 4bcb4edf2fe3582d6b491733, Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: 2907173c8c6a108c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:47 client Dropping Handshake keys. 2025/04/30 12:18:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:47 client -> Sending packet 2 (56 bytes) for connection 4bcb4edf2fe3582d6b491733, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: 2907173c8c6a108c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 93.254µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:47 client -> Sending packet 3 (48 bytes) for connection 4bcb4edf2fe3582d6b491733, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: 2907173c8c6a108c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:47 client -> Sending packet 4 (1366 bytes) for connection 4bcb4edf2fe3582d6b491733, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: 2907173c8c6a108c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.PingFrame{} 2025/04/30 12:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:47 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:47 client -> Sending packet 5 (37 bytes) for connection 4bcb4edf2fe3582d6b491733, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: 2907173c8c6a108c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 79.008µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:47 client -> Sending packet 6 (30 bytes) for connection 4bcb4edf2fe3582d6b491733, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: 2907173c8c6a108c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:47 client Connection 4bcb4edf2fe3582d6b491733 closed. 2025/04/30 12:18:47 Requesting https://server4:443/wwekohquxf. 2025/04/30 12:18:47 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:47 Increased send buffer size to 14336 kiB 2025/04/30 12:18:47 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:47 Created qlog file: /logs/qlog/9a0063bd9ebb160d07d204.sqlog 2025/04/30 12:18:47 client Starting new connection to server4 ([::]:36956 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9a0063bd9ebb160d07d204, version v1 2025/04/30 12:18:47 Adding connection ID (empty). 2025/04/30 12:18:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:47 client -> Sending packet 0 (1280 bytes) for connection 9a0063bd9ebb160d07d204, Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: 9a0063bd9ebb160d07d204, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:18:47 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:47 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5bb41b123a80f8d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:47 client Received first packet. Switching destination connection ID to: e5bb41b123a80f8d 2025/04/30 12:18:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/04/30 12:18:47 client newly acked packets (1): [0] 2025/04/30 12:18:47 client updated RTT: 32.988012ms (σ: 16.494006ms) 2025/04/30 12:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:47 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5bb41b123a80f8d, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9a0063bd9ebb160d07d204, InitialSourceConnectionID: e5bb41b123a80f8d, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xeed6935f1c3703ea1e7f0eed25b32df8, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9a0063bd9ebb160d07d204 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: e5bb41b123a80f8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: e5bb41b123a80f8d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:47 client Dropping Initial keys. 2025/04/30 12:18:47 client -> Sending packet 1 (89 bytes) for connection 9a0063bd9ebb160d07d204, Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: e5bb41b123a80f8d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client Short Header{DestConnectionID: e5bb41b123a80f8d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:47 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:47 client Dropping Handshake keys. 2025/04/30 12:18:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:47 client -> Sending packet 1 (35 bytes) for connection 9a0063bd9ebb160d07d204, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e5bb41b123a80f8d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 65.692µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:47 client -> Sending packet 3 (46 bytes) for connection 9a0063bd9ebb160d07d204, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e5bb41b123a80f8d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:47 client -> Sending packet 4 (46 bytes) for connection 9a0063bd9ebb160d07d204, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e5bb41b123a80f8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:47 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:47 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:47 client -> Sending packet 5 (35 bytes) for connection 9a0063bd9ebb160d07d204, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e5bb41b123a80f8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 90.329µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:47 client -> Sending packet 6 (30 bytes) for connection 9a0063bd9ebb160d07d204, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e5bb41b123a80f8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:47 client Connection 9a0063bd9ebb160d07d204 closed. 2025/04/30 12:18:47 Requesting https://server4:443/kuluwgvfki. 2025/04/30 12:18:47 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:47 Increased send buffer size to 14336 kiB 2025/04/30 12:18:47 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:47 Created qlog file: /logs/qlog/6d9c734a13ebbea406eb.sqlog 2025/04/30 12:18:47 client Starting new connection to server4 ([::]:48282 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6d9c734a13ebbea406eb, version v1 2025/04/30 12:18:47 Adding connection ID (empty). 2025/04/30 12:18:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:47 client -> Sending packet 0 (1280 bytes) for connection 6d9c734a13ebbea406eb, Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: 6d9c734a13ebbea406eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:47 client -> Sending packet 1 (1280 bytes) for connection 6d9c734a13ebbea406eb, Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: 6d9c734a13ebbea406eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:47 client -> Sending packet 2 (1280 bytes) for connection 6d9c734a13ebbea406eb, Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: 6d9c734a13ebbea406eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:47 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e36d79f4a51da443, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:47 client Received first packet. Switching destination connection ID to: e36d79f4a51da443 2025/04/30 12:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client -> Sending packet 3 (1280 bytes) for connection 6d9c734a13ebbea406eb, Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: e36d79f4a51da443, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e36d79f4a51da443, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:47 client -> Sending packet 4 (1280 bytes) for connection 6d9c734a13ebbea406eb, Initial 2025/04/30 12:18:47 client Long Header{Type: Initial, DestConnectionID: e36d79f4a51da443, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e36d79f4a51da443, PacketNumber: 1, PacketNumberLen: 1, Length: 750, Version: v1} 2025/04/30 12:18:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/04/30 12:18:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6d9c734a13ebbea406eb, InitialSourceConnectionID: e36d79f4a51da443, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x1df363837574af9b9fbfc9e7617b29b2, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:47 client -> Sending packet 0 (82 bytes) for connection 6d9c734a13ebbea406eb, Handshake 2025/04/30 12:18:47 client Long Header{Type: Handshake, DestConnectionID: e36d79f4a51da443, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:47 client Dropping Initial keys. 2025/04/30 12:18:47 client -> Sending packet 0 (46 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e36d79f4a51da443, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:47 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:47 client Dropping Handshake keys. 2025/04/30 12:18:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:47 client -> Sending packet 1 (1366 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e36d79f4a51da443, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.PingFrame{} 2025/04/30 12:18:47 client -> Sending packet 2 (35 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:47 client Short Header{DestConnectionID: e36d79f4a51da443, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 94.507µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:47 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:48 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:48 client -> Sending packet 3 (36 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: e36d79f4a51da443, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.249982ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 26.216ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client newly acked packets (2): [0 1] 2025/04/30 12:18:48 client ECN capability confirmed. 2025/04/30 12:18:48 client Canceling loss detection timer. 2025/04/30 12:18:48 client -> Sending packet 4 (1409 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: e36d79f4a51da443, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.PingFrame{} 2025/04/30 12:18:48 client <- Reading packet 7 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 56µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client newly acked packets (1): [4] 2025/04/30 12:18:48 client updated RTT: 31.789243ms (σ: 15.894621ms) 2025/04/30 12:18:48 client <- Reading packet 8 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dcd0c836334f6b86, StatelessResetToken: 0x382b91cd7cfcccac8a6e1b16097dae9c} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c9abf4022ed238bb, StatelessResetToken: 0x2653cab789322438937eaa0551ffe225} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 490625142c2b1608, StatelessResetToken: 0x99c63702684e9d9827e3adcc8c9043c6} 2025/04/30 12:18:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:48 client -> Sending packet 5 (39 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: dcd0c836334f6b86, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 96.36µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:48 client <- Reading packet 10 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:48 client -> Sending packet 6 (39 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: dcd0c836334f6b86, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 69.75µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:48 client -> Sending packet 7 (30 bytes) for connection 6d9c734a13ebbea406eb, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: dcd0c836334f6b86, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:48 client Connection 6d9c734a13ebbea406eb closed. 2025/04/30 12:18:48 Requesting https://server4:443/mxyeueiotw. 2025/04/30 12:18:48 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:48 Increased send buffer size to 14336 kiB 2025/04/30 12:18:48 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:48 Created qlog file: /logs/qlog/c96420620d4afec3681161b0f2b0.sqlog 2025/04/30 12:18:48 client Starting new connection to server4 ([::]:33132 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c96420620d4afec3681161b0f2b0, version v1 2025/04/30 12:18:48 Adding connection ID (empty). 2025/04/30 12:18:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:48 client -> Sending packet 0 (1280 bytes) for connection c96420620d4afec3681161b0f2b0, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: c96420620d4afec3681161b0f2b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:18:48 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:48 client -> Sending packet 1 (1280 bytes) for connection c96420620d4afec3681161b0f2b0, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: c96420620d4afec3681161b0f2b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:18:48 client -> Sending packet 2 (1280 bytes) for connection c96420620d4afec3681161b0f2b0, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: c96420620d4afec3681161b0f2b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 12:18:48 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c89be0faf7cf301d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:48 client Received first packet. Switching destination connection ID to: c89be0faf7cf301d 2025/04/30 12:18:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client -> Sending packet 3 (1280 bytes) for connection c96420620d4afec3681161b0f2b0, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: c89be0faf7cf301d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:48 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c89be0faf7cf301d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:48 client -> Sending packet 4 (1280 bytes) for connection c96420620d4afec3681161b0f2b0, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: c89be0faf7cf301d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c89be0faf7cf301d, PacketNumber: 1, PacketNumberLen: 1, Length: 753, Version: v1} 2025/04/30 12:18:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:18:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c96420620d4afec3681161b0f2b0, InitialSourceConnectionID: c89be0faf7cf301d, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x1c684f504bf1aa57db271e62d5c80abd, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:48 client -> Sending packet 0 (82 bytes) for connection c96420620d4afec3681161b0f2b0, Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: c89be0faf7cf301d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:48 client Dropping Initial keys. 2025/04/30 12:18:48 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da91d28c31d92bd8, StatelessResetToken: 0xe9127c30866e847ed72a2c34dacdb089} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ac365b0bf7fe2734, StatelessResetToken: 0x58778a7c8d0f24554f52a653d7ae13f0} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 29c2ea69479096f7, StatelessResetToken: 0x22f98134feb8ddb60ba4b547c61b38e6} 2025/04/30 12:18:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:48 client -> Sending packet 0 (40 bytes) for connection c96420620d4afec3681161b0f2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: da91d28c31d92bd8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 333.992598ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:48 client -> Sending packet 1 (46 bytes) for connection c96420620d4afec3681161b0f2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: da91d28c31d92bd8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:48 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:48 client -> Sending packet 2 (37 bytes) for connection c96420620d4afec3681161b0f2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: da91d28c31d92bd8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 86.081µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:48 client -> Sending packet 1 (69 bytes) for connection c96420620d4afec3681161b0f2b0, Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: da91d28c31d92bd8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/04/30 12:18:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:48 client Short Header{DestConnectionID: da91d28c31d92bd8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:48 client Connection c96420620d4afec3681161b0f2b0 closed. 2025/04/30 12:18:48 Requesting https://server4:443/knvctbbgme. 2025/04/30 12:18:48 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:48 Increased send buffer size to 14336 kiB 2025/04/30 12:18:48 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:48 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:48 Created qlog file: /logs/qlog/fe71c559f177c9140de16ab7902eed.sqlog 2025/04/30 12:18:48 client Starting new connection to server4 ([::]:51899 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fe71c559f177c9140de16ab7902eed, version v1 2025/04/30 12:18:48 Adding connection ID (empty). 2025/04/30 12:18:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:48 client -> Sending packet 0 (1280 bytes) for connection fe71c559f177c9140de16ab7902eed, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: fe71c559f177c9140de16ab7902eed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:48 client -> Sending packet 1 (1280 bytes) for connection fe71c559f177c9140de16ab7902eed, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: fe71c559f177c9140de16ab7902eed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:48 client -> Sending packet 2 (1280 bytes) for connection fe71c559f177c9140de16ab7902eed, Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: fe71c559f177c9140de16ab7902eed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:48 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:48 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 91905b4eee4a9f15, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:48 client Received first packet. Switching destination connection ID to: 91905b4eee4a9f15 2025/04/30 12:18:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 440µs} 2025/04/30 12:18:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:48 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 91905b4eee4a9f15, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fe71c559f177c9140de16ab7902eed, InitialSourceConnectionID: 91905b4eee4a9f15, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x40b863a010f6739d4529937248dd450f, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:48 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7eaec7c62f88e9be, StatelessResetToken: 0x93bc053dedb3e84da4252734e619f699} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1269db2820913cbf, StatelessResetToken: 0x4dd68a91816c26816f9075db254fd542} 2025/04/30 12:18:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3b840cbc0253951b, StatelessResetToken: 0xb020e72bdbba0cd66845355c1bb0c1af} 2025/04/30 12:18:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fe71c559f177c9140de16ab7902eed 2025/04/30 12:18:48 client Long Header{Type: Initial, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:48 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:48 client Dropping Initial keys. 2025/04/30 12:18:48 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:18:48 client -> Sending packet 1 (43 bytes) for connection fe71c559f177c9140de16ab7902eed, Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:48 client -> Sending packet 1 (36 bytes) for connection fe71c559f177c9140de16ab7902eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:48 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 849.89µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:48 client -> Sending packet 2 (74 bytes) for connection fe71c559f177c9140de16ab7902eed, Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:48 client -> Sending packet 3 (74 bytes) for connection fe71c559f177c9140de16ab7902eed, Handshake 2025/04/30 12:18:48 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:49 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:18:49 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:18:49 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/04/30 12:18:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 91905b4eee4a9f15, PacketNumber: 1, PacketNumberLen: 1, Length: 755, Version: v1} 2025/04/30 12:18:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/04/30 12:18:49 client -> Sending packet 4 (43 bytes) for connection fe71c559f177c9140de16ab7902eed, Handshake 2025/04/30 12:18:49 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:49 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:18:49 client -> Sending packet 5 (74 bytes) for connection fe71c559f177c9140de16ab7902eed, Handshake 2025/04/30 12:18:49 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:49 client -> Sending packet 6 (74 bytes) for connection fe71c559f177c9140de16ab7902eed, Handshake 2025/04/30 12:18:49 client Long Header{Type: Handshake, DestConnectionID: 7eaec7c62f88e9be, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:49 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:49 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:49 client Dropping Handshake keys. 2025/04/30 12:18:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:49 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:49 client -> Sending packet 3 (56 bytes) for connection fe71c559f177c9140de16ab7902eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:49 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 89.337µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:49 client -> Sending packet 4 (48 bytes) for connection fe71c559f177c9140de16ab7902eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:49 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:49 client -> Sending packet 5 (1366 bytes) for connection fe71c559f177c9140de16ab7902eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:49 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:49 client -> &wire.PingFrame{} 2025/04/30 12:18:49 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:49 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:49 client -> Sending packet 6 (37 bytes) for connection fe71c559f177c9140de16ab7902eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:49 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 60.693µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:49 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:49 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:49 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:49 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:49 client newly acked packets (1): [5] 2025/04/30 12:18:49 client updated RTT: 32.014895ms (σ: 16.007447ms) 2025/04/30 12:18:49 client ECN capability confirmed. 2025/04/30 12:18:49 client setting loss timer for packet 4 (1-RTT) to 36.016756ms (in 2025-04-30 12:18:49.443345725 +0000 UTC m=+35.865300099) 2025/04/30 12:18:49 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:49 client -> Sending packet 7 (30 bytes) for connection fe71c559f177c9140de16ab7902eed, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:49 client Short Header{DestConnectionID: 7eaec7c62f88e9be, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:49 client Connection fe71c559f177c9140de16ab7902eed closed. 2025/04/30 12:18:49 Requesting https://server4:443/onxdvvbdwv. 2025/04/30 12:18:49 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:49 Increased send buffer size to 14336 kiB 2025/04/30 12:18:49 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:49 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:49 Created qlog file: /logs/qlog/fcdcf17a95eb4f3d19858f3aab5d02.sqlog 2025/04/30 12:18:49 client Starting new connection to server4 ([::]:37244 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fcdcf17a95eb4f3d19858f3aab5d02, version v1 2025/04/30 12:18:49 Adding connection ID (empty). 2025/04/30 12:18:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:49 client -> Sending packet 0 (1280 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Initial 2025/04/30 12:18:49 client Long Header{Type: Initial, DestConnectionID: fcdcf17a95eb4f3d19858f3aab5d02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:49 client -> Sending packet 1 (1280 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Initial 2025/04/30 12:18:49 client Long Header{Type: Initial, DestConnectionID: fcdcf17a95eb4f3d19858f3aab5d02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:49 client -> Sending packet 2 (1280 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Initial 2025/04/30 12:18:49 client Long Header{Type: Initial, DestConnectionID: fcdcf17a95eb4f3d19858f3aab5d02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:50 client -> Sending packet 3 (1280 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Initial 2025/04/30 12:18:50 client Long Header{Type: Initial, DestConnectionID: fcdcf17a95eb4f3d19858f3aab5d02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:50 client -> Sending packet 4 (1280 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Initial 2025/04/30 12:18:50 client Long Header{Type: Initial, DestConnectionID: fcdcf17a95eb4f3d19858f3aab5d02, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 12:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 12:18:50 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:50 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f68059c39bc6db56, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:50 client Received first packet. Switching destination connection ID to: f68059c39bc6db56 2025/04/30 12:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:50 client -> Sending packet 5 (1280 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Initial 2025/04/30 12:18:50 client Long Header{Type: Initial, DestConnectionID: f68059c39bc6db56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:50 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/04/30 12:18:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f68059c39bc6db56, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 12:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:18:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fcdcf17a95eb4f3d19858f3aab5d02, InitialSourceConnectionID: f68059c39bc6db56, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x82eaa122a23d2ed71a580d1c6caa7eba, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:50 client -> Sending packet 0 (82 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Handshake 2025/04/30 12:18:50 client Long Header{Type: Handshake, DestConnectionID: f68059c39bc6db56, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:50 client Dropping Initial keys. 2025/04/30 12:18:50 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f0d8c9378d6ae256, StatelessResetToken: 0x53d1bb1ce7e08c3e809833b00565d143} 2025/04/30 12:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 54a24599adf890ea, StatelessResetToken: 0x5a1f43fa7e6b372a79afcee53221871f} 2025/04/30 12:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d24ee1be9158a2a8, StatelessResetToken: 0x567b39af076e2d7d5a59e9d31b357907} 2025/04/30 12:18:50 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:50 client -> Sending packet 0 (40 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:50 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 339.974329ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:50 client -> Sending packet 1 (46 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:50 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:50 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/04/30 12:18:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f68059c39bc6db56, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/04/30 12:18:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:18:50 client -> Sending packet 1 (43 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, Handshake 2025/04/30 12:18:50 client Long Header{Type: Handshake, DestConnectionID: f0d8c9378d6ae256, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:50 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:50 client Dropping Handshake keys. 2025/04/30 12:18:50 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:50 client -> Sending packet 2 (1366 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:50 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:50 client -> &wire.PingFrame{} 2025/04/30 12:18:50 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:50 client -> Sending packet 3 (36 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:50 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.312363ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 26.616ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client newly acked packets (1): [1] 2025/04/30 12:18:50 client updated RTT: 57.314607ms (σ: 28.657303ms) 2025/04/30 12:18:50 client ECN capability confirmed. 2025/04/30 12:18:50 client setting loss timer for packet 0 (1-RTT) to 64.478932ms (in 2025-04-30 12:18:50.479329222 +0000 UTC m=+36.901283607) 2025/04/30 12:18:50 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 12:18:50.479329222 +0000 UTC m=+36.901283607 2025/04/30 12:18:50 client lost packet 0 (time threshold) 2025/04/30 12:18:50 client Canceling loss detection timer. 2025/04/30 12:18:50 client -> Sending packet 4 (29 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:50 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:50 client <- Reading packet 5 (28 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:50 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:50 client newly acked packets (1): [4] 2025/04/30 12:18:50 client updated RTT: 53.989ms (σ: 28.141ms) 2025/04/30 12:18:50 client lost packet 2 (time threshold) 2025/04/30 12:18:50 client Canceling loss detection timer. 2025/04/30 12:18:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:50 client <- Reading packet 8 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:50 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1d6f3a19c1bfb3de, StatelessResetToken: 0x3c08cee62a0a8f98ed2ce5784123da53} 2025/04/30 12:18:50 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:50 client -> Sending packet 5 (39 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:50 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:50 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 76.143µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:51 client <- Reading packet 11 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1d6f3a19c1bfb3de, StatelessResetToken: 0x3c08cee62a0a8f98ed2ce5784123da53} 2025/04/30 12:18:51 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:51 client <- Reading packet 12 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1d6f3a19c1bfb3de, StatelessResetToken: 0x3c08cee62a0a8f98ed2ce5784123da53} 2025/04/30 12:18:51 client -> Sending packet 6 (1323 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.PingFrame{} 2025/04/30 12:18:51 client -> Sending packet 7 (41 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 173.895µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client <- Reading packet 13 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 64µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client newly acked packets (1): [6] 2025/04/30 12:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:51 client -> Sending packet 8 (30 bytes) for connection fcdcf17a95eb4f3d19858f3aab5d02, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: f0d8c9378d6ae256, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:51 client Connection fcdcf17a95eb4f3d19858f3aab5d02 closed. 2025/04/30 12:18:51 Requesting https://server4:443/niuirmhiri. 2025/04/30 12:18:51 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:51 Increased send buffer size to 14336 kiB 2025/04/30 12:18:51 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:51 Created qlog file: /logs/qlog/00a79cf6ddc7643d.sqlog 2025/04/30 12:18:51 client Starting new connection to server4 ([::]:39440 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 00a79cf6ddc7643d, version v1 2025/04/30 12:18:51 Adding connection ID (empty). 2025/04/30 12:18:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:51 client -> Sending packet 0 (1280 bytes) for connection 00a79cf6ddc7643d, Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: 00a79cf6ddc7643d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:51 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:51 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:51 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:51 client -> Sending packet 1 (1280 bytes) for connection 00a79cf6ddc7643d, Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: 00a79cf6ddc7643d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:51 client -> Sending packet 2 (1280 bytes) for connection 00a79cf6ddc7643d, Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: 00a79cf6ddc7643d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 12:18:51 client <- Reading packet 1 (40 bytes) for connection (empty), Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 485b06f7dd75efb1, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:18:51 client Received first packet. Switching destination connection ID to: 485b06f7dd75efb1 2025/04/30 12:18:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 12:18:51 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 485b06f7dd75efb1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:51 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:51 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:51 client -> Sending packet 3 (1280 bytes) for connection 00a79cf6ddc7643d, Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: 485b06f7dd75efb1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:51 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:51 client <- Reading packet 1 (765 bytes) for connection (empty), Handshake 2025/04/30 12:18:51 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 485b06f7dd75efb1, PacketNumber: 1, PacketNumberLen: 1, Length: 748, Version: v1} 2025/04/30 12:18:51 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/04/30 12:18:51 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:51 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:51 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 00a79cf6ddc7643d, InitialSourceConnectionID: 485b06f7dd75efb1, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x407dbfad6c22956e45f347dfcb05f3a0, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:51 client -> Sending packet 0 (82 bytes) for connection 00a79cf6ddc7643d, Handshake 2025/04/30 12:18:51 client Long Header{Type: Handshake, DestConnectionID: 485b06f7dd75efb1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:51 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:51 client Dropping Initial keys. 2025/04/30 12:18:51 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 94fc864d5a5d0c36, StatelessResetToken: 0x264954269bf1d1e14d021f464e0e4b69} 2025/04/30 12:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 39ab55c1abee444b, StatelessResetToken: 0x412b94c3f4cef2eacd507968c3f89cad} 2025/04/30 12:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 507e7ff6596eb4e6, StatelessResetToken: 0xdd45de18e77a7d03684f94a62f98dcd6} 2025/04/30 12:18:51 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:51 client -> Sending packet 0 (59 bytes) for connection 00a79cf6ddc7643d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: 94fc864d5a5d0c36, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 335.308784ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:51 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:51 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:51 client Dropping Handshake keys. 2025/04/30 12:18:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:51 client -> Sending packet 1 (1366 bytes) for connection 00a79cf6ddc7643d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: 94fc864d5a5d0c36, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.PingFrame{} 2025/04/30 12:18:51 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7b4bbdbd96b89a7f, StatelessResetToken: 0x5f8e5354459b4d86fff6545e1165c24b} 2025/04/30 12:18:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:51 client -> Sending packet 2 (35 bytes) for connection 00a79cf6ddc7643d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: 94fc864d5a5d0c36, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 166.171µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:51 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:51 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:51 client -> Sending packet 3 (35 bytes) for connection 00a79cf6ddc7643d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: 94fc864d5a5d0c36, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 105.738µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:51 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:51 client -> Sending packet 4 (30 bytes) for connection 00a79cf6ddc7643d, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:51 client Short Header{DestConnectionID: 94fc864d5a5d0c36, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:51 client Connection 00a79cf6ddc7643d closed. 2025/04/30 12:18:51 Requesting https://server4:443/vyuzhxcpqo. 2025/04/30 12:18:51 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:51 Increased send buffer size to 14336 kiB 2025/04/30 12:18:51 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:51 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:51 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:51 Created qlog file: /logs/qlog/81f8692e9cb8bb27c83eb3.sqlog 2025/04/30 12:18:51 client Starting new connection to server4 ([::]:52190 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 81f8692e9cb8bb27c83eb3, version v1 2025/04/30 12:18:51 Adding connection ID (empty). 2025/04/30 12:18:51 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:51 client -> Sending packet 0 (1280 bytes) for connection 81f8692e9cb8bb27c83eb3, Initial 2025/04/30 12:18:51 client Long Header{Type: Initial, DestConnectionID: 81f8692e9cb8bb27c83eb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:51 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:52 client -> Sending packet 1 (1280 bytes) for connection 81f8692e9cb8bb27c83eb3, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 81f8692e9cb8bb27c83eb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:52 client -> Sending packet 2 (1280 bytes) for connection 81f8692e9cb8bb27c83eb3, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 81f8692e9cb8bb27c83eb3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 12:18:52 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:52 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 638a96f77fa112b1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:52 client Received first packet. Switching destination connection ID to: 638a96f77fa112b1 2025/04/30 12:18:52 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 416µs} 2025/04/30 12:18:52 client newly acked packets (1): [2] 2025/04/30 12:18:52 client updated RTT: 34.162242ms (σ: 17.081121ms) 2025/04/30 12:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:52 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 638a96f77fa112b1, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/04/30 12:18:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 81f8692e9cb8bb27c83eb3, InitialSourceConnectionID: 638a96f77fa112b1, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa45f1af3fefa0a38b7ba3fe6e8ed17fe, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:52 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 059646f825ee6786, StatelessResetToken: 0xada616e97ef94fbbbec7f8b03f6ec4f8} 2025/04/30 12:18:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b0fb69239af4ad82, StatelessResetToken: 0xa10ff6f8479ca541dfaf354343ad63aa} 2025/04/30 12:18:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 13afcd9f34adb095, StatelessResetToken: 0x2eb5daa95219bc7d0885bbc8a55d2c67} 2025/04/30 12:18:52 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 81f8692e9cb8bb27c83eb3 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 059646f825ee6786, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Long Header{Type: Handshake, DestConnectionID: 059646f825ee6786, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:52 client Dropping Initial keys. 2025/04/30 12:18:52 client -> Sending packet 1 (43 bytes) for connection 81f8692e9cb8bb27c83eb3, Handshake 2025/04/30 12:18:52 client Long Header{Type: Handshake, DestConnectionID: 059646f825ee6786, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client -> Sending packet 1 (55 bytes) for connection 81f8692e9cb8bb27c83eb3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 834.061µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:52 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:52 client Dropping Handshake keys. 2025/04/30 12:18:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:52 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 34e12141a95a6500, StatelessResetToken: 0x6d5df80848876ed1314ebfe4242e8ae4} 2025/04/30 12:18:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:52 client -> Sending packet 2 (35 bytes) for connection 81f8692e9cb8bb27c83eb3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 102.913µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client <- Reading packet 3 (24 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 26.4ms} 2025/04/30 12:18:52 client newly acked packets (1): [0] 2025/04/30 12:18:52 client updated RTT: 37.155ms (σ: 18.797ms) 2025/04/30 12:18:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:52 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:52 client -> Sending packet 4 (46 bytes) for connection 81f8692e9cb8bb27c83eb3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:52 client -> Sending packet 5 (46 bytes) for connection 81f8692e9cb8bb27c83eb3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:52 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:52 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:52 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:52 client -> Sending packet 6 (37 bytes) for connection 81f8692e9cb8bb27c83eb3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 88.776µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:52 client -> Sending packet 7 (30 bytes) for connection 81f8692e9cb8bb27c83eb3, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: 059646f825ee6786, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:52 client Connection 81f8692e9cb8bb27c83eb3 closed. 2025/04/30 12:18:52 Requesting https://server4:443/boxauqenqg. 2025/04/30 12:18:52 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:52 Increased send buffer size to 14336 kiB 2025/04/30 12:18:52 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:52 Created qlog file: /logs/qlog/3da03cc9398b7d1575a3bfd204979f8b1477.sqlog 2025/04/30 12:18:52 client Starting new connection to server4 ([::]:52285 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3da03cc9398b7d1575a3bfd204979f8b1477, version v1 2025/04/30 12:18:52 Adding connection ID (empty). 2025/04/30 12:18:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:52 client -> Sending packet 0 (1280 bytes) for connection 3da03cc9398b7d1575a3bfd204979f8b1477, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 3da03cc9398b7d1575a3bfd204979f8b1477, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 12:18:52 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:52 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ff016cf4cb4504f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:52 client Received first packet. Switching destination connection ID to: ff016cf4cb4504f6 2025/04/30 12:18:52 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/04/30 12:18:52 client newly acked packets (1): [0] 2025/04/30 12:18:52 client updated RTT: 32.986311ms (σ: 16.493155ms) 2025/04/30 12:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:52 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:52 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff016cf4cb4504f6, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/04/30 12:18:52 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3da03cc9398b7d1575a3bfd204979f8b1477, InitialSourceConnectionID: ff016cf4cb4504f6, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x3c727483fdbefa8bd26ba197b89eee1a, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:52 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3da03cc9398b7d1575a3bfd204979f8b1477 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: ff016cf4cb4504f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Long Header{Type: Handshake, DestConnectionID: ff016cf4cb4504f6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:52 client Dropping Initial keys. 2025/04/30 12:18:52 client -> Sending packet 1 (89 bytes) for connection 3da03cc9398b7d1575a3bfd204979f8b1477, Handshake 2025/04/30 12:18:52 client Long Header{Type: Handshake, DestConnectionID: ff016cf4cb4504f6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Short Header{DestConnectionID: ff016cf4cb4504f6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:52 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:52 client Dropping Handshake keys. 2025/04/30 12:18:52 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:52 client -> Sending packet 1 (35 bytes) for connection 3da03cc9398b7d1575a3bfd204979f8b1477, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: ff016cf4cb4504f6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 75.18µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:52 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:52 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:52 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:52 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:52 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:52 client -> Sending packet 2 (35 bytes) for connection 3da03cc9398b7d1575a3bfd204979f8b1477, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: ff016cf4cb4504f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 103.002µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:52 client -> Sending packet 3 (30 bytes) for connection 3da03cc9398b7d1575a3bfd204979f8b1477, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:52 client Short Header{DestConnectionID: ff016cf4cb4504f6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:52 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:52 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:52 client Connection 3da03cc9398b7d1575a3bfd204979f8b1477 closed. 2025/04/30 12:18:52 Requesting https://server4:443/bskxqufgsb. 2025/04/30 12:18:52 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:52 Increased send buffer size to 14336 kiB 2025/04/30 12:18:52 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:52 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:52 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:52 Created qlog file: /logs/qlog/ae9dc901c8794fa60c6d6ed14b04b08dc354f846.sqlog 2025/04/30 12:18:52 client Starting new connection to server4 ([::]:45212 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ae9dc901c8794fa60c6d6ed14b04b08dc354f846, version v1 2025/04/30 12:18:52 Adding connection ID (empty). 2025/04/30 12:18:52 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:52 client -> Sending packet 0 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: ae9dc901c8794fa60c6d6ed14b04b08dc354f846, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:52 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:18:52 client -> Sending packet 1 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: ae9dc901c8794fa60c6d6ed14b04b08dc354f846, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:52 client -> Sending packet 2 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: ae9dc901c8794fa60c6d6ed14b04b08dc354f846, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:52 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:52 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 059f3ee42a505584, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:52 client Received first packet. Switching destination connection ID to: 059f3ee42a505584 2025/04/30 12:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:52 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:52 client -> Sending packet 3 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 059f3ee42a505584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Queueing packet (102 bytes) for later decryption 2025/04/30 12:18:52 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 059f3ee42a505584, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/04/30 12:18:52 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:52 client -> Sending packet 4 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 059f3ee42a505584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:52 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:52 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:18:52 client -> Sending packet 5 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 059f3ee42a505584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:52 client -> Sending packet 6 (1280 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: 059f3ee42a505584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 12:18:52 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:52 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 059f3ee42a505584, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:52 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 72µs} 2025/04/30 12:18:52 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/04/30 12:18:52 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 059f3ee42a505584, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 12:18:52 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 48µs} 2025/04/30 12:18:52 client newly acked packets (1): [6] 2025/04/30 12:18:52 client updated RTT: 32.808977ms (σ: 16.404488ms) 2025/04/30 12:18:53 client <- Reading packet 2 (777 bytes) for connection (empty), Handshake 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 059f3ee42a505584, PacketNumber: 2, PacketNumberLen: 1, Length: 760, Version: v1} 2025/04/30 12:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 739, Offset + Data length: 739} 2025/04/30 12:18:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ae9dc901c8794fa60c6d6ed14b04b08dc354f846, InitialSourceConnectionID: 059f3ee42a505584, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xcd1bc00b60c6ce61f0d275c663e53f0c, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:53 client -> Sending packet 0 (82 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, Handshake 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: 059f3ee42a505584, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:53 client Dropping Initial keys. 2025/04/30 12:18:53 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 167d43c6f65b007d, StatelessResetToken: 0xa923798ed5cb6161e7db34606a8fa2fa} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b3856756714ad07, StatelessResetToken: 0x4818362bd18a9788f5f46964d67d0417} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b94977b0568578ab, StatelessResetToken: 0x5de4fb936c9a74fa4d55cde7f62db21b} 2025/04/30 12:18:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:53 client -> Sending packet 0 (59 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 167d43c6f65b007d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 602.514432ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:53 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:53 client Dropping Handshake keys. 2025/04/30 12:18:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:53 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2828408687a99aa4, StatelessResetToken: 0x3bd6e33edfef3b2b29fed427756c58c4} 2025/04/30 12:18:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:53 client -> Sending packet 1 (35 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 167d43c6f65b007d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 86.402µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:53 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:53 client -> Sending packet 2 (35 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 167d43c6f65b007d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 120.382µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:53 client -> Sending packet 3 (30 bytes) for connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 167d43c6f65b007d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:53 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:53 client Connection ae9dc901c8794fa60c6d6ed14b04b08dc354f846 closed. 2025/04/30 12:18:53 Requesting https://server4:443/zenfkwavuh. 2025/04/30 12:18:53 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:53 Increased send buffer size to 14336 kiB 2025/04/30 12:18:53 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:53 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:53 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:53 Created qlog file: /logs/qlog/c103d3a6a67050cb9981c142e4ba.sqlog 2025/04/30 12:18:53 client Starting new connection to server4 ([::]:57961 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c103d3a6a67050cb9981c142e4ba, version v1 2025/04/30 12:18:53 Adding connection ID (empty). 2025/04/30 12:18:53 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:53 client -> Sending packet 0 (1280 bytes) for connection c103d3a6a67050cb9981c142e4ba, Initial 2025/04/30 12:18:53 client Long Header{Type: Initial, DestConnectionID: c103d3a6a67050cb9981c142e4ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 12:18:53 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:53 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:53 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 22bcb932215f83a2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:53 client Received first packet. Switching destination connection ID to: 22bcb932215f83a2 2025/04/30 12:18:53 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 12:18:53 client newly acked packets (1): [0] 2025/04/30 12:18:53 client updated RTT: 33.023282ms (σ: 16.511641ms) 2025/04/30 12:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:53 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:53 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:53 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:53 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 22bcb932215f83a2, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:53 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/04/30 12:18:53 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:53 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:53 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c103d3a6a67050cb9981c142e4ba, InitialSourceConnectionID: 22bcb932215f83a2, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x68388ea349c0379060510d04fd339f47, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:53 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5d9ae1befbe09f3a, StatelessResetToken: 0x778fbde6e2fe9e55d7e0a9f09c6c4335} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e198e04ffc22871, StatelessResetToken: 0x59fd1b83a1f8dd49457701a33a6ae674} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 13effabcc9cfaea1, StatelessResetToken: 0x393334f7b640887e95649b9f3d2375d2} 2025/04/30 12:18:53 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:53 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c103d3a6a67050cb9981c142e4ba 2025/04/30 12:18:53 client Long Header{Type: Initial, DestConnectionID: 5d9ae1befbe09f3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: 5d9ae1befbe09f3a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:53 client Dropping Initial keys. 2025/04/30 12:18:53 client -> Sending packet 1 (89 bytes) for connection c103d3a6a67050cb9981c142e4ba, Handshake 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: 5d9ae1befbe09f3a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:53 client -> Sending packet 2 (36 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 784.869µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:18:53 client -> Sending packet 2 (74 bytes) for connection c103d3a6a67050cb9981c142e4ba, Handshake 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: 5d9ae1befbe09f3a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:53 client -> Sending packet 3 (74 bytes) for connection c103d3a6a67050cb9981c142e4ba, Handshake 2025/04/30 12:18:53 client Long Header{Type: Handshake, DestConnectionID: 5d9ae1befbe09f3a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:53 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:53 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:53 client Dropping Handshake keys. 2025/04/30 12:18:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:53 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 12:18:53 client -> Sending packet 4 (37 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 97.864µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:53 client Skipping packet number 3 2025/04/30 12:18:53 client -> Sending packet 5 (46 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:53 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client newly acked packets (1): [4] 2025/04/30 12:18:53 client updated RTT: 32.731ms (σ: 12.966ms) 2025/04/30 12:18:53 client ECN capability confirmed. 2025/04/30 12:18:53 client Ignoring all packets below 2. 2025/04/30 12:18:53 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:53 client -> Sending packet 6 (37 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 67.246µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 26.52ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client newly acked packets (1): [5] 2025/04/30 12:18:53 client updated RTT: 32.668ms (σ: 9.848ms) 2025/04/30 12:18:53 client Canceling loss detection timer. 2025/04/30 12:18:53 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cc3f368ca8f0de22, StatelessResetToken: 0xfc5a6b0c709ea89cfde4a0b983b639ec} 2025/04/30 12:18:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:53 client <- Reading packet 9 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cc3f368ca8f0de22, StatelessResetToken: 0xfc5a6b0c709ea89cfde4a0b983b639ec} 2025/04/30 12:18:53 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:53 client -> Sending packet 7 (39 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 143.849µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 12:18:53 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 12:18:53 client <- Reading packet 11 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.PingFrame{} 2025/04/30 12:18:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:53 client -> Sending packet 8 (1366 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.PingFrame{} 2025/04/30 12:18:53 client -> Sending packet 9 (41 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 151.714µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client <- Reading packet 14 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.PingFrame{} 2025/04/30 12:18:53 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:53 client <- Reading packet 15 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.PingFrame{} 2025/04/30 12:18:53 client -> Sending packet 10 (43 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 2, AckRanges: {{Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 91.782µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 12:18:53 client <- Reading packet 16 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:53 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:53 client <- &wire.PingFrame{} 2025/04/30 12:18:53 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:53 client Sending ACK because the ACK timer expired. 2025/04/30 12:18:53 client -> Sending packet 11 (44 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:53 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:53 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 2, AckRanges: {{Largest: 16, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 25.261685ms, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client <- Reading packet 18 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.PingFrame{} 2025/04/30 12:18:54 client Queuing ACK because there's a new missing packet to report. 2025/04/30 12:18:54 client <- Reading packet 19 (22 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.PingFrame{} 2025/04/30 12:18:54 client -> Sending packet 12 (45 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:54 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.AckFrame{LargestAcked: 19, LowestAcked: 2, AckRanges: {{Largest: 19, Smallest: 18}, {Largest: 16, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 137.176µs, ECT0: 13, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client <- Reading packet 20 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:54 client -> Sending packet 13 (30 bytes) for connection c103d3a6a67050cb9981c142e4ba, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:54 client Short Header{DestConnectionID: 5d9ae1befbe09f3a, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:54 client Connection c103d3a6a67050cb9981c142e4ba closed. 2025/04/30 12:18:54 Requesting https://server4:443/wmxnddbibe. 2025/04/30 12:18:54 Increased receive buffer size to 14336 kiB 2025/04/30 12:18:54 Increased send buffer size to 14336 kiB 2025/04/30 12:18:54 Setting DF for IPv4 and IPv6. 2025/04/30 12:18:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:18:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:18:54 Created qlog file: /logs/qlog/c71744e5fb01a567f38b0610761c.sqlog 2025/04/30 12:18:54 client Starting new connection to server4 ([::]:37426 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c71744e5fb01a567f38b0610761c, version v1 2025/04/30 12:18:54 Adding connection ID (empty). 2025/04/30 12:18:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:18:54 client -> Sending packet 0 (1280 bytes) for connection c71744e5fb01a567f38b0610761c, Initial 2025/04/30 12:18:54 client Long Header{Type: Initial, DestConnectionID: c71744e5fb01a567f38b0610761c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 12:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 12:18:54 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:18:54 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:18:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 085addca027c4a33, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:18:54 client Received first packet. Switching destination connection ID to: 085addca027c4a33 2025/04/30 12:18:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 12:18:54 client newly acked packets (1): [0] 2025/04/30 12:18:54 client updated RTT: 32.991632ms (σ: 16.495816ms) 2025/04/30 12:18:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:18:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:54 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:18:54 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:18:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 085addca027c4a33, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:18:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/04/30 12:18:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:18:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c71744e5fb01a567f38b0610761c, InitialSourceConnectionID: 085addca027c4a33, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x1f0ec5877c3fc224e929e49c1d998c26, MaxDatagramFrameSize: 65535} 2025/04/30 12:18:54 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2da9b7e4f0eaadc5, StatelessResetToken: 0x28241e82d67cc0813c434dbb409e2e33} 2025/04/30 12:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3400ba7f554e6675, StatelessResetToken: 0x1f64174cce7a2b5a58641dce434dfcab} 2025/04/30 12:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08f709dbea2432bf, StatelessResetToken: 0x3d5bd0577a89ac607dd7b0cd26c316c6} 2025/04/30 12:18:54 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:18:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c71744e5fb01a567f38b0610761c 2025/04/30 12:18:54 client Long Header{Type: Initial, DestConnectionID: 2da9b7e4f0eaadc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:18:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client Long Header{Type: Handshake, DestConnectionID: 2da9b7e4f0eaadc5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:18:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:18:54 client Short Header{DestConnectionID: 2da9b7e4f0eaadc5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:18:54 client Dropping Initial keys. 2025/04/30 12:18:54 client -> Sending packet 1 (89 bytes) for connection c71744e5fb01a567f38b0610761c, Handshake 2025/04/30 12:18:54 client Long Header{Type: Handshake, DestConnectionID: 2da9b7e4f0eaadc5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:18:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client Short Header{DestConnectionID: 2da9b7e4f0eaadc5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:18:54 client -> Sending packet 2 (36 bytes) for connection c71744e5fb01a567f38b0610761c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:54 client Short Header{DestConnectionID: 2da9b7e4f0eaadc5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 865.5µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client <- Reading packet 1 (24 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:18:54 client Dropping Handshake keys. 2025/04/30 12:18:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs} 2025/04/30 12:18:54 client newly acked packets (2): [0 1] 2025/04/30 12:18:54 client updated RTT: 32.822ms (σ: 12.708ms) 2025/04/30 12:18:54 client Canceling loss detection timer. 2025/04/30 12:18:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:54 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 31a63c488fc6033e, StatelessResetToken: 0x4b77cb30a8602047235f018e14d97aa3} 2025/04/30 12:18:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:54 client -> Sending packet 3 (35 bytes) for connection c71744e5fb01a567f38b0610761c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:54 client Short Header{DestConnectionID: 2da9b7e4f0eaadc5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 154.698µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:18:54 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:18:54 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:18:54 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:18:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:18:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:18:54 client -> Sending packet 4 (35 bytes) for connection c71744e5fb01a567f38b0610761c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:54 client Short Header{DestConnectionID: 2da9b7e4f0eaadc5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 33.008µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:18:54 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:18:54 client -> Sending packet 5 (30 bytes) for connection c71744e5fb01a567f38b0610761c, 1-RTT (ECN: ECT(0)) 2025/04/30 12:18:54 client Short Header{DestConnectionID: 2da9b7e4f0eaadc5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:18:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:18:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:18:54 client Connection c71744e5fb01a567f38b0610761c closed.