2025/09/12 06:17:20 Requesting https://server4:443/zpbhuwsjti. 2025/09/12 06:17:20 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:20 Increased send buffer size to 14336 kiB 2025/09/12 06:17:20 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:20 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:20 Created qlog file: /logs/qlog/383d9c3bdb4bc5701f8a.sqlog 2025/09/12 06:17:20 client Starting new connection to server4 ([::]:57788 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 383d9c3bdb4bc5701f8a, version v1 2025/09/12 06:17:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:20 client -> Sending packet 0 (1280 bytes) for connection 383d9c3bdb4bc5701f8a, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: 383d9c3bdb4bc5701f8a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:20 client -> Sending packet 1 (1280 bytes) for connection 383d9c3bdb4bc5701f8a, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: 383d9c3bdb4bc5701f8a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 06:17:20 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:20 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0872ccb6f3dfbb8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:20 client Received first packet. Switching destination connection ID to: f0872ccb6f3dfbb8 2025/09/12 06:17:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 448µs} 2025/09/12 06:17:20 client newly acked packets (2): [0 1] 2025/09/12 06:17:20 client updated RTT: 38.00547ms (σ: 19.002735ms) 2025/09/12 06:17:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:20 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0872ccb6f3dfbb8, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 383d9c3bdb4bc5701f8a, InitialSourceConnectionID: f0872ccb6f3dfbb8, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xcdaa75311f658a39da27dabd5bf82834, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:20 client <- Reading packet 1 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d28793af6ab85297, StatelessResetToken: 0x2143eb0e6b72d507758263a99bd84d35} 2025/09/12 06:17:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d29f61a8c0bdb6a9, StatelessResetToken: 0x85cd17ab14cfea2bc307189e1f6186cb} 2025/09/12 06:17:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 993f5c39b63be467, StatelessResetToken: 0x244585c246eba4d13111479475bd2fe9} 2025/09/12 06:17:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 383d9c3bdb4bc5701f8a 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: d28793af6ab85297, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: d28793af6ab85297, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:20 client Dropping Initial keys. 2025/09/12 06:17:20 client -> Sending packet 1 (89 bytes) for connection 383d9c3bdb4bc5701f8a, Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: d28793af6ab85297, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:20 client -> Sending packet 2 (36 bytes) for connection 383d9c3bdb4bc5701f8a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 985.467µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:20 client -> Sending packet 2 (74 bytes) for connection 383d9c3bdb4bc5701f8a, Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: d28793af6ab85297, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:20 client -> Sending packet 3 (74 bytes) for connection 383d9c3bdb4bc5701f8a, Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: d28793af6ab85297, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:20 client <- Reading packet 2 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:20 client Dropping Handshake keys. 2025/09/12 06:17:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:20 client -> Sending packet 4 (37 bytes) for connection 383d9c3bdb4bc5701f8a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 88.106µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:20 client Skipping packet number 3 2025/09/12 06:17:20 client -> Sending packet 5 (46 bytes) for connection 383d9c3bdb4bc5701f8a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:20 client <- Reading packet 3 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client newly acked packets (1): [4] 2025/09/12 06:17:20 client updated RTT: 37.089ms (σ: 16.083ms) 2025/09/12 06:17:20 client ECN capability confirmed. 2025/09/12 06:17:20 client Ignoring all packets below 3. 2025/09/12 06:17:20 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:20 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:20 client -> Sending packet 6 (37 bytes) for connection 383d9c3bdb4bc5701f8a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 59.271µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:20 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:20 client -> Sending packet 7 (30 bytes) for connection 383d9c3bdb4bc5701f8a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: d28793af6ab85297, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:20 client Connection 383d9c3bdb4bc5701f8a closed. 2025/09/12 06:17:20 Requesting https://server4:443/yhydqaahix. 2025/09/12 06:17:20 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:20 Increased send buffer size to 14336 kiB 2025/09/12 06:17:20 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:20 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:20 Created qlog file: /logs/qlog/bc26cfb81b789573c49d13.sqlog 2025/09/12 06:17:20 client Starting new connection to server4 ([::]:56170 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bc26cfb81b789573c49d13, version v1 2025/09/12 06:17:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:20 client -> Sending packet 0 (1280 bytes) for connection bc26cfb81b789573c49d13, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: bc26cfb81b789573c49d13, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:20 client -> Sending packet 1 (1280 bytes) for connection bc26cfb81b789573c49d13, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: bc26cfb81b789573c49d13, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 1237, Data length: 269, Offset + Data length: 1506} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:20 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8ee765b5e5bbf4f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:20 client Received first packet. Switching destination connection ID to: f8ee765b5e5bbf4f 2025/09/12 06:17:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112µs} 2025/09/12 06:17:20 client newly acked packets (1): [0] 2025/09/12 06:17:20 client updated RTT: 31.733307ms (σ: 15.866653ms) 2025/09/12 06:17:20 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:20 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8ee765b5e5bbf4f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:20 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 328µs} 2025/09/12 06:17:20 client newly acked packets (1): [1] 2025/09/12 06:17:20 client updated RTT: 31.995ms (σ: 12.424ms) 2025/09/12 06:17:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:20 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:20 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8ee765b5e5bbf4f, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:20 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 06:17:20 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:20 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bc26cfb81b789573c49d13, InitialSourceConnectionID: f8ee765b5e5bbf4f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x028c134813d134364589101b831d5e95, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:20 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bc26cfb81b789573c49d13 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: f8ee765b5e5bbf4f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: f8ee765b5e5bbf4f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:20 client Dropping Initial keys. 2025/09/12 06:17:20 client -> Sending packet 1 (43 bytes) for connection bc26cfb81b789573c49d13, Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: f8ee765b5e5bbf4f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client -> Sending packet 0 (46 bytes) for connection bc26cfb81b789573c49d13, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: f8ee765b5e5bbf4f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:20 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:20 client -> Sending packet 2 (74 bytes) for connection bc26cfb81b789573c49d13, Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: f8ee765b5e5bbf4f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:20 client -> Sending packet 3 (74 bytes) for connection bc26cfb81b789573c49d13, Handshake 2025/09/12 06:17:20 client Long Header{Type: Handshake, DestConnectionID: f8ee765b5e5bbf4f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:20 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:20 client Dropping Handshake keys. 2025/09/12 06:17:20 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:20 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:20 client -> Sending packet 2 (54 bytes) for connection bc26cfb81b789573c49d13, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: f8ee765b5e5bbf4f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 91.16µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:20 client -> Sending packet 3 (46 bytes) for connection bc26cfb81b789573c49d13, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: f8ee765b5e5bbf4f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:20 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:20 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:20 client -> Sending packet 4 (37 bytes) for connection bc26cfb81b789573c49d13, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: f8ee765b5e5bbf4f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 60.374µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:20 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:20 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:20 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:20 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:20 client -> Sending packet 5 (30 bytes) for connection bc26cfb81b789573c49d13, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:20 client Short Header{DestConnectionID: f8ee765b5e5bbf4f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:20 client Connection bc26cfb81b789573c49d13 closed. 2025/09/12 06:17:20 Requesting https://server4:443/inzuuiivdu. 2025/09/12 06:17:20 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:20 Increased send buffer size to 14336 kiB 2025/09/12 06:17:20 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:20 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:20 Created qlog file: /logs/qlog/8be666440e9b3d61b8e5dc.sqlog 2025/09/12 06:17:20 client Starting new connection to server4 ([::]:34423 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8be666440e9b3d61b8e5dc, version v1 2025/09/12 06:17:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:20 client -> Sending packet 0 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: 8be666440e9b3d61b8e5dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 06:17:20 client -> Sending packet 1 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: 8be666440e9b3d61b8e5dc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 06:17:20 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ef041579f8220c4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:20 client Received first packet. Switching destination connection ID to: 9ef041579f8220c4 2025/09/12 06:17:20 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/09/12 06:17:20 client newly acked packets (1): [0] 2025/09/12 06:17:20 client updated RTT: 31.746619ms (σ: 15.873309ms) 2025/09/12 06:17:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:20 client -> Sending packet 2 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:20 client -> Sending packet 3 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:20 client Long Header{Type: Initial, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 06:17:20 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:21 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ef041579f8220c4, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 80µs} 2025/09/12 06:17:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:21 client -> Sending packet 4 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> Sending packet 5 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1237, Data length: 281, Offset + Data length: 1518} 2025/09/12 06:17:21 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9ef041579f8220c4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client -> Sending packet 6 (1280 bytes) for connection 8be666440e9b3d61b8e5dc, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client <- Reading packet 1 (767 bytes) for connection (empty), Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ef041579f8220c4, PacketNumber: 1, PacketNumberLen: 1, Length: 750, Version: v1} 2025/09/12 06:17:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 06:17:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8be666440e9b3d61b8e5dc, InitialSourceConnectionID: 9ef041579f8220c4, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xab42590bb9e4e5dfcaae81a2cc90972d, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:21 client -> Sending packet 0 (82 bytes) for connection 8be666440e9b3d61b8e5dc, Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:21 client Dropping Initial keys. 2025/09/12 06:17:21 client -> Sending packet 0 (46 bytes) for connection 8be666440e9b3d61b8e5dc, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 9ef041579f8220c4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:21 client <- Reading packet 2 (767 bytes) for connection (empty), Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9ef041579f8220c4, PacketNumber: 2, PacketNumberLen: 1, Length: 750, Version: v1} 2025/09/12 06:17:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 06:17:21 client -> Sending packet 1 (43 bytes) for connection 8be666440e9b3d61b8e5dc, Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:21 client -> Sending packet 2 (74 bytes) for connection 8be666440e9b3d61b8e5dc, Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:21 client -> Sending packet 3 (74 bytes) for connection 8be666440e9b3d61b8e5dc, Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: 9ef041579f8220c4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:21 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:21 client Dropping Handshake keys. 2025/09/12 06:17:21 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:21 client -> Sending packet 2 (54 bytes) for connection 8be666440e9b3d61b8e5dc, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 9ef041579f8220c4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 116.008µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:21 client -> Sending packet 3 (46 bytes) for connection 8be666440e9b3d61b8e5dc, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 9ef041579f8220c4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:21 client <- Reading packet 2 (110 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 825bd8740009e2ed, StatelessResetToken: 0x1274890374ddb167638b7ce29007a49e} 2025/09/12 06:17:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1406d7edf459bb9e, StatelessResetToken: 0xa2b1ea8280ff94bd68e12f8018774417} 2025/09/12 06:17:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05b893897bc8ecaf, StatelessResetToken: 0x44c651f43cc2c3cff14570a424a1e872} 2025/09/12 06:17:21 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:21 client -> Sending packet 4 (37 bytes) for connection 8be666440e9b3d61b8e5dc, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 05b893897bc8ecaf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 103.314µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:21 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:21 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:21 client -> Sending packet 5 (37 bytes) for connection 8be666440e9b3d61b8e5dc, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 05b893897bc8ecaf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 55.414µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 26.568ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client newly acked packets (1): [3] 2025/09/12 06:17:21 client updated RTT: 31.821ms (σ: 12.055ms) 2025/09/12 06:17:21 client ECN capability confirmed. 2025/09/12 06:17:21 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:21 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:21 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:21 client -> Sending packet 6 (30 bytes) for connection 8be666440e9b3d61b8e5dc, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 05b893897bc8ecaf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:21 client Connection 8be666440e9b3d61b8e5dc closed. 2025/09/12 06:17:21 Requesting https://server4:443/naiajzlmhd. 2025/09/12 06:17:21 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:21 Increased send buffer size to 14336 kiB 2025/09/12 06:17:21 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:21 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:21 Created qlog file: /logs/qlog/b1383685aa9bf6cf517d.sqlog 2025/09/12 06:17:21 client Starting new connection to server4 ([::]:43519 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b1383685aa9bf6cf517d, version v1 2025/09/12 06:17:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:21 client -> Sending packet 0 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: b1383685aa9bf6cf517d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 06:17:21 client -> Sending packet 1 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: b1383685aa9bf6cf517d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12eb2256543a84a3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:21 client Received first packet. Switching destination connection ID to: 12eb2256543a84a3 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:21 client newly acked packets (1): [0] 2025/09/12 06:17:21 client updated RTT: 31.759084ms (σ: 15.879542ms) 2025/09/12 06:17:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:21 client -> Sending packet 2 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 12eb2256543a84a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 06:17:21 client -> Sending packet 3 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 12eb2256543a84a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 06:17:21 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12eb2256543a84a3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:21 client -> Sending packet 4 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 12eb2256543a84a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 06:17:21 client -> Sending packet 5 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 12eb2256543a84a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1238, Data length: 274, Offset + Data length: 1512} 2025/09/12 06:17:21 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12eb2256543a84a3, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 06:17:21 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12eb2256543a84a3, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client -> Sending packet 6 (1280 bytes) for connection b1383685aa9bf6cf517d, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 12eb2256543a84a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client <- Reading packet 2 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12eb2256543a84a3, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b1383685aa9bf6cf517d, InitialSourceConnectionID: 12eb2256543a84a3, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xfbbbebb50eb3015af203aceae23c8053, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:21 client -> Sending packet 0 (82 bytes) for connection b1383685aa9bf6cf517d, Handshake 2025/09/12 06:17:21 client Long Header{Type: Handshake, DestConnectionID: 12eb2256543a84a3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:21 client Dropping Initial keys. 2025/09/12 06:17:21 client -> Sending packet 0 (46 bytes) for connection b1383685aa9bf6cf517d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 12eb2256543a84a3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:21 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:21 client Dropping Handshake keys. 2025/09/12 06:17:21 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:21 client -> Sending packet 1 (35 bytes) for connection b1383685aa9bf6cf517d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 12eb2256543a84a3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 79.55µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:21 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:21 client -> Sending packet 2 (37 bytes) for connection b1383685aa9bf6cf517d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 12eb2256543a84a3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 48.962µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:21 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:21 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:21 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:21 client -> Sending packet 3 (30 bytes) for connection b1383685aa9bf6cf517d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:21 client Short Header{DestConnectionID: 12eb2256543a84a3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:21 client Connection b1383685aa9bf6cf517d closed. 2025/09/12 06:17:21 Requesting https://server4:443/dvtsmfjmwr. 2025/09/12 06:17:21 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:21 Increased send buffer size to 14336 kiB 2025/09/12 06:17:21 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:21 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:21 Created qlog file: /logs/qlog/4a49e8d6b9f0a3f2a916e7332a.sqlog 2025/09/12 06:17:21 client Starting new connection to server4 ([::]:36565 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4a49e8d6b9f0a3f2a916e7332a, version v1 2025/09/12 06:17:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:21 client -> Sending packet 0 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 4a49e8d6b9f0a3f2a916e7332a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:21 client -> Sending packet 1 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 4a49e8d6b9f0a3f2a916e7332a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 06:17:21 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 185911fe84fa3469, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:21 client Received first packet. Switching destination connection ID to: 185911fe84fa3469 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 72µs} 2025/09/12 06:17:21 client newly acked packets (1): [0] 2025/09/12 06:17:21 client updated RTT: 31.737937ms (σ: 15.868968ms) 2025/09/12 06:17:21 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:21 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:21 client -> Sending packet 2 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 185911fe84fa3469, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 06:17:21 client -> Sending packet 3 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: 185911fe84fa3469, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 06:17:21 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:21 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 185911fe84fa3469, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 64µs} 2025/09/12 06:17:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:22 client -> Sending packet 4 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:22 client Long Header{Type: Initial, DestConnectionID: 185911fe84fa3469, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:22 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 06:17:22 client -> Sending packet 5 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:22 client Long Header{Type: Initial, DestConnectionID: 185911fe84fa3469, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:22 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/12 06:17:22 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:22 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 185911fe84fa3469, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:22 client -> Sending packet 6 (1280 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Initial 2025/09/12 06:17:22 client Long Header{Type: Initial, DestConnectionID: 185911fe84fa3469, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:22 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:22 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/09/12 06:17:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 185911fe84fa3469, PacketNumber: 1, PacketNumberLen: 1, Length: 753, Version: v1} 2025/09/12 06:17:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 06:17:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4a49e8d6b9f0a3f2a916e7332a, InitialSourceConnectionID: 185911fe84fa3469, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xaf0e3f247b796938b3b9fab97c5c00b3, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:22 client -> Sending packet 0 (82 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Handshake 2025/09/12 06:17:22 client Long Header{Type: Handshake, DestConnectionID: 185911fe84fa3469, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:22 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:22 client Dropping Initial keys. 2025/09/12 06:17:22 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:22 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bbe3ad9dde595433, StatelessResetToken: 0xfc3b5c2c7993e12aadce5f4da433ccf0} 2025/09/12 06:17:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2341c65998c23638, StatelessResetToken: 0x6aa99b9764b288e5087abd7fb055e88d} 2025/09/12 06:17:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb4d83c6f8006836, StatelessResetToken: 0x6c23f5a19f073a65203966f0af6885a1} 2025/09/12 06:17:22 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:22 client -> Sending packet 0 (59 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:22 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 333.685774ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:22 client <- Reading packet 2 (770 bytes) for connection (empty), Handshake 2025/09/12 06:17:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 185911fe84fa3469, PacketNumber: 2, PacketNumberLen: 1, Length: 753, Version: v1} 2025/09/12 06:17:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 06:17:22 client -> Sending packet 1 (43 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, Handshake 2025/09/12 06:17:22 client Long Header{Type: Handshake, DestConnectionID: bbe3ad9dde595433, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:22 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:22 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:22 client Dropping Handshake keys. 2025/09/12 06:17:22 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:22 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:22 client -> Sending packet 1 (36 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:22 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:22 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.308792ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:22 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 26.464ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client newly acked packets (1): [0] 2025/09/12 06:17:22 client updated RTT: 31.792ms (σ: 12.011ms) 2025/09/12 06:17:22 client ECN capability confirmed. 2025/09/12 06:17:22 client Canceling loss detection timer. 2025/09/12 06:17:22 client Ignoring all packets below 1. 2025/09/12 06:17:22 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:22 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3486379a0e426cbf, StatelessResetToken: 0x67c17e8827247e4adf0ebe37d32b7fe5} 2025/09/12 06:17:22 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:22 client <- Reading packet 7 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:22 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3486379a0e426cbf, StatelessResetToken: 0x67c17e8827247e4adf0ebe37d32b7fe5} 2025/09/12 06:17:22 client -> Sending packet 2 (1366 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:22 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:22 client -> &wire.PingFrame{} 2025/09/12 06:17:22 client -> Sending packet 3 (37 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:22 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:22 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 176.852µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client <- Reading packet 8 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:22 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:22 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.248ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:22 client newly acked packets (1): [2] 2025/09/12 06:17:22 client updated RTT: 31.819ms (σ: 9.062ms) 2025/09/12 06:17:23 client <- Reading packet 9 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3486379a0e426cbf, StatelessResetToken: 0x67c17e8827247e4adf0ebe37d32b7fe5} 2025/09/12 06:17:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:23 client <- Reading packet 10 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3486379a0e426cbf, StatelessResetToken: 0x67c17e8827247e4adf0ebe37d32b7fe5} 2025/09/12 06:17:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:23 client -> Sending packet 4 (1409 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.PingFrame{} 2025/09/12 06:17:23 client -> Sending packet 5 (37 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 195.077µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client <- Reading packet 11 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:23 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:23 client -> Sending packet 6 (30 bytes) for connection 4a49e8d6b9f0a3f2a916e7332a, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: bbe3ad9dde595433, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:23 client Connection 4a49e8d6b9f0a3f2a916e7332a closed. 2025/09/12 06:17:23 Requesting https://server4:443/yghtaizcpg. 2025/09/12 06:17:23 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:23 Increased send buffer size to 14336 kiB 2025/09/12 06:17:23 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:23 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:23 Created qlog file: /logs/qlog/31b6901a56bba68f4cc786ba.sqlog 2025/09/12 06:17:23 client Starting new connection to server4 ([::]:43900 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 31b6901a56bba68f4cc786ba, version v1 2025/09/12 06:17:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:23 client -> Sending packet 0 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 31b6901a56bba68f4cc786ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:23 client -> Sending packet 1 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 31b6901a56bba68f4cc786ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 272, Offset + Data length: 1508} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:23 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5c1d73908c3a98ba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:23 client Received first packet. Switching destination connection ID to: 5c1d73908c3a98ba 2025/09/12 06:17:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104µs} 2025/09/12 06:17:23 client newly acked packets (1): [0] 2025/09/12 06:17:23 client updated RTT: 31.690449ms (σ: 15.845224ms) 2025/09/12 06:17:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:23 client -> Sending packet 2 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 5c1d73908c3a98ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 272, Offset + Data length: 1508} 2025/09/12 06:17:23 client -> Sending packet 3 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 5c1d73908c3a98ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 272, Offset + Data length: 1508} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:23 client -> Sending packet 4 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 5c1d73908c3a98ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 272, Offset + Data length: 1508} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:23 client -> Sending packet 5 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 5c1d73908c3a98ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 1236, Data length: 272, Offset + Data length: 1508} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:23 client <- Reading packet 2 (44 bytes) for connection (empty), Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5c1d73908c3a98ba, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 26, Version: v1} 2025/09/12 06:17:23 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/09/12 06:17:23 client newly acked packets (1): [5] 2025/09/12 06:17:23 client updated RTT: 31.853ms (σ: 12.211ms) 2025/09/12 06:17:23 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5c1d73908c3a98ba, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:23 client -> Sending packet 6 (1280 bytes) for connection 31b6901a56bba68f4cc786ba, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: 5c1d73908c3a98ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client <- Reading packet 2 (767 bytes) for connection (empty), Handshake 2025/09/12 06:17:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5c1d73908c3a98ba, PacketNumber: 2, PacketNumberLen: 1, Length: 750, Version: v1} 2025/09/12 06:17:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 06:17:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 31b6901a56bba68f4cc786ba, InitialSourceConnectionID: 5c1d73908c3a98ba, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x2408089b532b0043ed2b24681f068b28, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:23 client -> Sending packet 0 (82 bytes) for connection 31b6901a56bba68f4cc786ba, Handshake 2025/09/12 06:17:23 client Long Header{Type: Handshake, DestConnectionID: 5c1d73908c3a98ba, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:23 client Dropping Initial keys. 2025/09/12 06:17:23 client -> Sending packet 0 (46 bytes) for connection 31b6901a56bba68f4cc786ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: 5c1d73908c3a98ba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:23 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:23 client Dropping Handshake keys. 2025/09/12 06:17:23 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:23 client -> Sending packet 1 (35 bytes) for connection 31b6901a56bba68f4cc786ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: 5c1d73908c3a98ba, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 141.235µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:23 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:23 client -> Sending packet 2 (37 bytes) for connection 31b6901a56bba68f4cc786ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: 5c1d73908c3a98ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 62.457µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 26.688ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client newly acked packets (1): [0] 2025/09/12 06:17:23 client updated RTT: 31.918ms (σ: 9.289ms) 2025/09/12 06:17:23 client ECN capability confirmed. 2025/09/12 06:17:23 client Canceling loss detection timer. 2025/09/12 06:17:23 client <- Reading packet 5 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08385675ee11de11, StatelessResetToken: 0x6b16d96c86c397aa5fa3eb2e69a92ee5} 2025/09/12 06:17:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 894c0d4c84df68f8, StatelessResetToken: 0xb2e50e2dfcbebf7bac0ba7cc480d93e0} 2025/09/12 06:17:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79b4fdd8a9e03dd2, StatelessResetToken: 0x09a4808d5700c8e639770807cf12404e} 2025/09/12 06:17:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:23 client -> Sending packet 3 (39 bytes) for connection 31b6901a56bba68f4cc786ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: 79b4fdd8a9e03dd2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 96.241µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:23 client <- Reading packet 6 (1056 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:23 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:23 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:23 client newly acked packets (1): [3] 2025/09/12 06:17:23 client updated RTT: 31.858ms (σ: 7.085ms) 2025/09/12 06:17:23 client Canceling loss detection timer. 2025/09/12 06:17:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:23 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:23 client Ignoring all packets below 6. 2025/09/12 06:17:23 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:23 client -> Sending packet 4 (30 bytes) for connection 31b6901a56bba68f4cc786ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:23 client Short Header{DestConnectionID: 79b4fdd8a9e03dd2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:23 client Connection 31b6901a56bba68f4cc786ba closed. 2025/09/12 06:17:23 Requesting https://server4:443/nkasqjcimq. 2025/09/12 06:17:23 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:23 Increased send buffer size to 14336 kiB 2025/09/12 06:17:23 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:23 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:23 Created qlog file: /logs/qlog/c9753b6cf0c10dc5.sqlog 2025/09/12 06:17:23 client Starting new connection to server4 ([::]:38824 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c9753b6cf0c10dc5, version v1 2025/09/12 06:17:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:23 client -> Sending packet 0 (1280 bytes) for connection c9753b6cf0c10dc5, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: c9753b6cf0c10dc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:23 client -> Sending packet 1 (1280 bytes) for connection c9753b6cf0c10dc5, Initial 2025/09/12 06:17:23 client Long Header{Type: Initial, DestConnectionID: c9753b6cf0c10dc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 1240, Data length: 274, Offset + Data length: 1514} 2025/09/12 06:17:23 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:24 client -> Sending packet 2 (1280 bytes) for connection c9753b6cf0c10dc5, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: c9753b6cf0c10dc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> Sending packet 3 (1280 bytes) for connection c9753b6cf0c10dc5, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: c9753b6cf0c10dc5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 1240, Data length: 274, Offset + Data length: 1514} 2025/09/12 06:17:24 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:24 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 44ff04504b98dbae, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:24 client Received first packet. Switching destination connection ID to: 44ff04504b98dbae 2025/09/12 06:17:24 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 376µs} 2025/09/12 06:17:24 client newly acked packets (1): [2] 2025/09/12 06:17:24 client updated RTT: 33.152982ms (σ: 16.576491ms) 2025/09/12 06:17:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:24 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 44ff04504b98dbae, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/09/12 06:17:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c9753b6cf0c10dc5, InitialSourceConnectionID: 44ff04504b98dbae, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x91aa0a71f145d4294a8db8a030a0e443, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c9753b6cf0c10dc5 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: 44ff04504b98dbae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: 44ff04504b98dbae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:24 client Dropping Initial keys. 2025/09/12 06:17:24 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4eb3a4c8a3f685c7, StatelessResetToken: 0x84b26ba8147dd6be00178a35f7b18bb2} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a431dd62ac8e49fc, StatelessResetToken: 0x97eee409e2779d46d5d973091a4191d4} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 92e83e4477bdff8c, StatelessResetToken: 0x0b6e6dc630f8b26d267793db291f825e} 2025/09/12 06:17:24 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:24 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/09/12 06:17:24 client -> Sending packet 1 (91 bytes) for connection c9753b6cf0c10dc5, Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: 4eb3a4c8a3f685c7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client Short Header{DestConnectionID: 4eb3a4c8a3f685c7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:24 client -> Sending packet 1 (36 bytes) for connection c9753b6cf0c10dc5, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: 4eb3a4c8a3f685c7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 705.698µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:24 client Dropping Handshake keys. 2025/09/12 06:17:24 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:24 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6b9466317df9801c, StatelessResetToken: 0xdf6bb89f8165ba1452ba0f4c4472e51f} 2025/09/12 06:17:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:24 client -> Sending packet 2 (35 bytes) for connection c9753b6cf0c10dc5, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: 4eb3a4c8a3f685c7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 94.982µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:24 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:24 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:24 client -> Sending packet 3 (35 bytes) for connection c9753b6cf0c10dc5, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: 4eb3a4c8a3f685c7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 70.469µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:24 client -> Sending packet 4 (30 bytes) for connection c9753b6cf0c10dc5, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: 4eb3a4c8a3f685c7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:24 client Connection c9753b6cf0c10dc5 closed. 2025/09/12 06:17:24 Requesting https://server4:443/aqfrogcqps. 2025/09/12 06:17:24 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:24 Increased send buffer size to 14336 kiB 2025/09/12 06:17:24 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:24 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:24 Created qlog file: /logs/qlog/cb959307280f86e104e1583ab740.sqlog 2025/09/12 06:17:24 client Starting new connection to server4 ([::]:53806 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cb959307280f86e104e1583ab740, version v1 2025/09/12 06:17:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:24 client -> Sending packet 0 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: cb959307280f86e104e1583ab740, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> Sending packet 1 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: cb959307280f86e104e1583ab740, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 1234, Data length: 270, Offset + Data length: 1504} 2025/09/12 06:17:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:24 client -> Sending packet 2 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: cb959307280f86e104e1583ab740, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:24 client -> Sending packet 3 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: cb959307280f86e104e1583ab740, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 1234, Data length: 270, Offset + Data length: 1504} 2025/09/12 06:17:24 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f1e6a37f1db9c259, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:24 client Received first packet. Switching destination connection ID to: f1e6a37f1db9c259 2025/09/12 06:17:24 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 104µs} 2025/09/12 06:17:24 client newly acked packets (1): [3] 2025/09/12 06:17:24 client updated RTT: 33.003458ms (σ: 16.501729ms) 2025/09/12 06:17:24 client setting loss timer for packet 2 (Initial) to 37.12889ms (in 2025-09-12 06:17:24.468834889 +0000 UTC m=+3.975944685) 2025/09/12 06:17:24 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:24.468834889 +0000 UTC m=+3.975944685 2025/09/12 06:17:24 client lost packet 2 (time threshold) 2025/09/12 06:17:24 client -> Sending packet 4 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: f1e6a37f1db9c259, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:24 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:24 client -> Sending packet 5 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: f1e6a37f1db9c259, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> Sending packet 6 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: f1e6a37f1db9c259, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:24 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f1e6a37f1db9c259, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client -> Sending packet 7 (1280 bytes) for connection cb959307280f86e104e1583ab740, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: f1e6a37f1db9c259, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:24 client <- Reading packet 1 (770 bytes) for connection (empty), Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f1e6a37f1db9c259, PacketNumber: 1, PacketNumberLen: 1, Length: 753, Version: v1} 2025/09/12 06:17:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 06:17:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cb959307280f86e104e1583ab740, InitialSourceConnectionID: f1e6a37f1db9c259, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x7665cf4d11d28cab28cc9c92bc787237, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:24 client -> Sending packet 0 (82 bytes) for connection cb959307280f86e104e1583ab740, Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: f1e6a37f1db9c259, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:24 client Dropping Initial keys. 2025/09/12 06:17:24 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c6c7dbe3319aa65a, StatelessResetToken: 0x7b9d7a175d6d7d65d57112f382cc630d} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae178346ba83a422, StatelessResetToken: 0x8d1ee35b3efe7ddc64749103068ac7d1} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b6c3c19a7f22559e, StatelessResetToken: 0x4be4e51f44bff379d1a4babe95609831} 2025/09/12 06:17:24 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:24 client -> Sending packet 0 (59 bytes) for connection cb959307280f86e104e1583ab740, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: c6c7dbe3319aa65a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 340.832475ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:24 client <- Reading packet 2 (770 bytes) for connection (empty), Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f1e6a37f1db9c259, PacketNumber: 2, PacketNumberLen: 1, Length: 753, Version: v1} 2025/09/12 06:17:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 06:17:24 client -> Sending packet 1 (43 bytes) for connection cb959307280f86e104e1583ab740, Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: c6c7dbe3319aa65a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c738589767e2d652, StatelessResetToken: 0x1cc187d569f494521039412f87153e41} 2025/09/12 06:17:24 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:24 client -> Sending packet 1 (37 bytes) for connection cb959307280f86e104e1583ab740, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: c6c7dbe3319aa65a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 89.218µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:24 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:24 client -> Sending packet 2 (39 bytes) for connection cb959307280f86e104e1583ab740, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:24 client Short Header{DestConnectionID: c6c7dbe3319aa65a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 60.213µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:24 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:24 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:24 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:24 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:24 client -> Sending packet 2 (69 bytes) for connection cb959307280f86e104e1583ab740, Handshake 2025/09/12 06:17:24 client Long Header{Type: Handshake, DestConnectionID: c6c7dbe3319aa65a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:24 client Short Header{DestConnectionID: c6c7dbe3319aa65a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:24 client Connection cb959307280f86e104e1583ab740 closed. 2025/09/12 06:17:24 Requesting https://server4:443/vvokswplpb. 2025/09/12 06:17:24 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:24 Increased send buffer size to 14336 kiB 2025/09/12 06:17:24 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:24 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:24 Created qlog file: /logs/qlog/2d3ec5140633462408.sqlog 2025/09/12 06:17:24 client Starting new connection to server4 ([::]:59844 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2d3ec5140633462408, version v1 2025/09/12 06:17:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:24 client -> Sending packet 0 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: 2d3ec5140633462408, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:24 client -> Sending packet 1 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: 2d3ec5140633462408, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 06:17:24 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:24 client Received first packet. Switching destination connection ID to: eb4ea51fb417f9c5 2025/09/12 06:17:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120µs} 2025/09/12 06:17:24 client newly acked packets (1): [0] 2025/09/12 06:17:24 client updated RTT: 31.789817ms (σ: 15.894908ms) 2025/09/12 06:17:24 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:24 client -> Sending packet 2 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 06:17:24 client -> Sending packet 3 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:24 client Long Header{Type: Initial, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:24 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 06:17:25 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs} 2025/09/12 06:17:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:25 client -> Sending packet 4 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 06:17:25 client -> Sending packet 5 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 1239, Data length: 272, Offset + Data length: 1511} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:25 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 80µs} 2025/09/12 06:17:25 client newly acked packets (1): [5] 2025/09/12 06:17:25 client updated RTT: 31.946ms (σ: 12.236ms) 2025/09/12 06:17:25 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client -> Sending packet 6 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:25 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:25 client -> Sending packet 7 (1280 bytes) for connection 2d3ec5140633462408, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 1 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, PacketNumber: 1, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2d3ec5140633462408, InitialSourceConnectionID: eb4ea51fb417f9c5, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x7c16e0079afdc8b665a2cc9310fac55e, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:25 client -> Sending packet 0 (82 bytes) for connection 2d3ec5140633462408, Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: eb4ea51fb417f9c5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:25 client Dropping Initial keys. 2025/09/12 06:17:25 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e82cc3d5d65bd791, StatelessResetToken: 0xab7c68bc92308ec24905e12df1970b4f} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b02f0f9b8bfe6a30, StatelessResetToken: 0x4a210b60d7d06508bab53b1328ccf917} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a0f4c5ca6156b798, StatelessResetToken: 0x62f39fafcde1e67a6d7ffeb02789ba79} 2025/09/12 06:17:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:25 client -> Sending packet 0 (40 bytes) for connection 2d3ec5140633462408, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: e82cc3d5d65bd791, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 333.925153ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:25 client -> Sending packet 1 (46 bytes) for connection 2d3ec5140633462408, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: e82cc3d5d65bd791, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:25 client <- Reading packet 2 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb4ea51fb417f9c5, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:25 client -> Sending packet 1 (43 bytes) for connection 2d3ec5140633462408, Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: e82cc3d5d65bd791, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:25 client Dropping Handshake keys. 2025/09/12 06:17:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:25 client <- Reading packet 3 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 24µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client newly acked packets (2): [0 1] 2025/09/12 06:17:25 client updated RTT: 31.832ms (σ: 9.403ms) 2025/09/12 06:17:25 client ECN capability confirmed. 2025/09/12 06:17:25 client Canceling loss detection timer. 2025/09/12 06:17:25 client Ignoring all packets below 1. 2025/09/12 06:17:25 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:25 client -> Sending packet 2 (39 bytes) for connection 2d3ec5140633462408, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: e82cc3d5d65bd791, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 75.722µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d19b3ffc64fced64, StatelessResetToken: 0x987f389011e7c810fba1f9f5c48553fd} 2025/09/12 06:17:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:25 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:25 client -> Sending packet 3 (40 bytes) for connection 2d3ec5140633462408, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: e82cc3d5d65bd791, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.372194ms, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:25 client -> Sending packet 4 (30 bytes) for connection 2d3ec5140633462408, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: e82cc3d5d65bd791, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:25 client Connection 2d3ec5140633462408 closed. 2025/09/12 06:17:25 Requesting https://server4:443/ixqbiplcff. 2025/09/12 06:17:25 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:25 Increased send buffer size to 14336 kiB 2025/09/12 06:17:25 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:25 Created qlog file: /logs/qlog/fa355acc3b7a8f45ddb1e8f84c56df.sqlog 2025/09/12 06:17:25 client Starting new connection to server4 ([::]:43290 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fa355acc3b7a8f45ddb1e8f84c56df, version v1 2025/09/12 06:17:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:25 client -> Sending packet 0 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: fa355acc3b7a8f45ddb1e8f84c56df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:25 client -> Sending packet 1 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: fa355acc3b7a8f45ddb1e8f84c56df, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 1233, Data length: 281, Offset + Data length: 1514} 2025/09/12 06:17:25 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:25 client Received first packet. Switching destination connection ID to: c6bd5c1a61ec36bd 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120µs} 2025/09/12 06:17:25 client newly acked packets (1): [1] 2025/09/12 06:17:25 client updated RTT: 32.758756ms (σ: 16.379378ms) 2025/09/12 06:17:25 client setting loss timer for packet 0 (Initial) to 36.8536ms (in 2025-09-12 06:17:25.389474899 +0000 UTC m=+4.896584685) 2025/09/12 06:17:25 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:25.389474899 +0000 UTC m=+4.896584685 2025/09/12 06:17:25 client lost packet 0 (time threshold) 2025/09/12 06:17:25 client -> Sending packet 2 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:25 client -> Sending packet 3 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:25 client -> Sending packet 4 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 48µs} 2025/09/12 06:17:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:25 client -> Sending packet 5 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client -> Sending packet 6 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:25 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 56µs} 2025/09/12 06:17:25 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client -> Sending packet 7 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:25 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:25 client -> Sending packet 8 (1280 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, PacketNumber: 1, PacketNumberLen: 1, Length: 755, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 06:17:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fa355acc3b7a8f45ddb1e8f84c56df, InitialSourceConnectionID: c6bd5c1a61ec36bd, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xcdcf9913e244a1aa41ef7dcf9aab88fd, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:25 client -> Sending packet 0 (82 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: c6bd5c1a61ec36bd, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:25 client Dropping Initial keys. 2025/09/12 06:17:25 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f0fb670eee034ac9, StatelessResetToken: 0xd019df1c4816ecac3f5556732005f657} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 79c5afea17859d21, StatelessResetToken: 0xa3b5e545c6759a032171f755a12856d0} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 54261cfadfe6e259, StatelessResetToken: 0xe4d5c84b7a6bfbceb2ff5553d40567ec} 2025/09/12 06:17:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:25 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c6bd5c1a61ec36bd, PacketNumber: 2, PacketNumberLen: 1, Length: 755, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 06:17:25 client -> Sending packet 1 (91 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: f0fb670eee034ac9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Short Header{DestConnectionID: f0fb670eee034ac9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:25 client -> Sending packet 1 (38 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: f0fb670eee034ac9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 334.935932ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:25 client Dropping Handshake keys. 2025/09/12 06:17:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:25 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:25 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:25 client -> Sending packet 2 (37 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: f0fb670eee034ac9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 73.447µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:25 client -> Sending packet 3 (30 bytes) for connection fa355acc3b7a8f45ddb1e8f84c56df, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: f0fb670eee034ac9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:25 client Connection fa355acc3b7a8f45ddb1e8f84c56df closed. 2025/09/12 06:17:25 Requesting https://server4:443/nvfagalqea. 2025/09/12 06:17:25 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:25 Increased send buffer size to 14336 kiB 2025/09/12 06:17:25 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:25 Created qlog file: /logs/qlog/d8d457b677b2a059401cb12cbcb0f6f9.sqlog 2025/09/12 06:17:25 client Starting new connection to server4 ([::]:55561 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d8d457b677b2a059401cb12cbcb0f6f9, version v1 2025/09/12 06:17:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:25 client -> Sending packet 0 (1280 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: d8d457b677b2a059401cb12cbcb0f6f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 06:17:25 client -> Sending packet 1 (1280 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: d8d457b677b2a059401cb12cbcb0f6f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 1232, Data length: 276, Offset + Data length: 1508} 2025/09/12 06:17:25 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:25 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 932fda651f6a1d49, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:25 client Received first packet. Switching destination connection ID to: 932fda651f6a1d49 2025/09/12 06:17:25 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 352µs} 2025/09/12 06:17:25 client newly acked packets (2): [0 1] 2025/09/12 06:17:25 client updated RTT: 33.87005ms (σ: 16.935025ms) 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:25 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:25 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 932fda651f6a1d49, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:25 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 06:17:25 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:25 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d8d457b677b2a059401cb12cbcb0f6f9, InitialSourceConnectionID: 932fda651f6a1d49, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x971f17923255f349339005b20b852961, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:25 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: 932fda651f6a1d49, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: 932fda651f6a1d49, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:25 client Dropping Initial keys. 2025/09/12 06:17:25 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 58d17303bbb019c9, StatelessResetToken: 0x924c262015adfc77f801d1779bb166e2} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1319117aca45b2f2, StatelessResetToken: 0x42ab295225604cb0dfe5a60e853aec9f} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 41a96993acb1b4b2, StatelessResetToken: 0xdbfcab6d71207a35c05817ac302c40aa} 2025/09/12 06:17:25 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:25 client -> Sending packet 1 (91 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, Handshake 2025/09/12 06:17:25 client Long Header{Type: Handshake, DestConnectionID: 58d17303bbb019c9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:25 client -> Sending packet 1 (36 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 766.293µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:25 client Dropping Handshake keys. 2025/09/12 06:17:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:25 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:25 client -> Sending packet 2 (36 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.266578ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:25 client -> Sending packet 4 (48 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:25 client -> Sending packet 5 (48 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:25 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:25 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 672aa6bfe0299b7f, StatelessResetToken: 0x445b65b60643ddf13d1953e8e3079e61} 2025/09/12 06:17:25 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:25 client -> Sending packet 6 (37 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 103.234µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:25 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:25 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:25 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:25 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:25 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:25 client -> Sending packet 7 (37 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 57.488µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:25 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:25 client -> Sending packet 8 (30 bytes) for connection d8d457b677b2a059401cb12cbcb0f6f9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:25 client Short Header{DestConnectionID: 58d17303bbb019c9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:25 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:25 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:25 client Connection d8d457b677b2a059401cb12cbcb0f6f9 closed. 2025/09/12 06:17:25 Requesting https://server4:443/nybdjhyiay. 2025/09/12 06:17:25 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:25 Increased send buffer size to 14336 kiB 2025/09/12 06:17:25 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:25 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:25 Created qlog file: /logs/qlog/dd59f6a5211f50e382697aff37234a52d4cd8d.sqlog 2025/09/12 06:17:25 client Starting new connection to server4 ([::]:41627 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dd59f6a5211f50e382697aff37234a52d4cd8d, version v1 2025/09/12 06:17:25 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:25 client -> Sending packet 0 (1280 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: dd59f6a5211f50e382697aff37234a52d4cd8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:25 client -> Sending packet 1 (1280 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Initial 2025/09/12 06:17:25 client Long Header{Type: Initial, DestConnectionID: dd59f6a5211f50e382697aff37234a52d4cd8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:25 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 06:17:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:26 client -> Sending packet 2 (1280 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: dd59f6a5211f50e382697aff37234a52d4cd8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:26 client -> Sending packet 3 (1280 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: dd59f6a5211f50e382697aff37234a52d4cd8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 1229, Data length: 283, Offset + Data length: 1512} 2025/09/12 06:17:26 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:26 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1ab30de5dcd5e97f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:26 client Received first packet. Switching destination connection ID to: 1ab30de5dcd5e97f 2025/09/12 06:17:26 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 320µs} 2025/09/12 06:17:26 client newly acked packets (2): [2 3] 2025/09/12 06:17:26 client updated RTT: 33.961343ms (σ: 16.980671ms) 2025/09/12 06:17:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:26 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1ab30de5dcd5e97f, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 06:17:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dd59f6a5211f50e382697aff37234a52d4cd8d, InitialSourceConnectionID: 1ab30de5dcd5e97f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa8b3c338587bd3ae74f90e0d6582cbe1, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:26 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: 1ab30de5dcd5e97f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: 1ab30de5dcd5e97f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:26 client Dropping Initial keys. 2025/09/12 06:17:26 client -> Sending packet 1 (89 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: 1ab30de5dcd5e97f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client Short Header{DestConnectionID: 1ab30de5dcd5e97f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:26 client -> Sending packet 2 (74 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: 1ab30de5dcd5e97f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:26 client -> Sending packet 3 (74 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: 1ab30de5dcd5e97f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:26 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:26 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:26 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:26 client Dropping Handshake keys. 2025/09/12 06:17:26 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:26 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:26 client -> Sending packet 2 (54 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: 1ab30de5dcd5e97f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 152.296µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:26 client -> Sending packet 3 (46 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: 1ab30de5dcd5e97f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:26 client <- Reading packet 2 (110 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:26 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:26 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client newly acked packets (1): [3] 2025/09/12 06:17:26 client updated RTT: 33.579ms (σ: 13.497ms) 2025/09/12 06:17:26 client ECN capability confirmed. 2025/09/12 06:17:26 client Canceling loss detection timer. 2025/09/12 06:17:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ae51bc9a16906c79, StatelessResetToken: 0x9289c2e092af93f369bca04569dce741} 2025/09/12 06:17:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b779c29874148df, StatelessResetToken: 0x0551d8e3308f32a02dab0c8412eeb217} 2025/09/12 06:17:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4753285d2cf47d13, StatelessResetToken: 0x507f9568cbb89925a8ab0e8742442dac} 2025/09/12 06:17:26 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:26 client -> Sending packet 4 (37 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: 4753285d2cf47d13, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 185.468µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:26 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:26 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:26 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:26 client -> Sending packet 5 (37 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: 4753285d2cf47d13, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 60.314µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:26 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:26 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:26 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:26 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:26 client -> Sending packet 6 (30 bytes) for connection dd59f6a5211f50e382697aff37234a52d4cd8d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: 4753285d2cf47d13, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:26 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:26 client Connection dd59f6a5211f50e382697aff37234a52d4cd8d closed. 2025/09/12 06:17:26 Requesting https://server4:443/lxsxxtqtgt. 2025/09/12 06:17:26 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:26 Increased send buffer size to 14336 kiB 2025/09/12 06:17:26 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:26 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:26 Created qlog file: /logs/qlog/65d6d4b77292eaa77b.sqlog 2025/09/12 06:17:26 client Starting new connection to server4 ([::]:33062 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 65d6d4b77292eaa77b, version v1 2025/09/12 06:17:26 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:26 client -> Sending packet 0 (1280 bytes) for connection 65d6d4b77292eaa77b, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: 65d6d4b77292eaa77b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:26 client -> Sending packet 1 (1280 bytes) for connection 65d6d4b77292eaa77b, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: 65d6d4b77292eaa77b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 1239, Data length: 277, Offset + Data length: 1516} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:26 client -> Sending packet 2 (1280 bytes) for connection 65d6d4b77292eaa77b, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: 65d6d4b77292eaa77b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:26 client -> Sending packet 3 (1280 bytes) for connection 65d6d4b77292eaa77b, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: 65d6d4b77292eaa77b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 1239, Data length: 277, Offset + Data length: 1516} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:26 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:26 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b01086ffd3f5cb5, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:26 client Received first packet. Switching destination connection ID to: 7b01086ffd3f5cb5 2025/09/12 06:17:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client -> Sending packet 4 (1280 bytes) for connection 65d6d4b77292eaa77b, Initial 2025/09/12 06:17:26 client Long Header{Type: Initial, DestConnectionID: 7b01086ffd3f5cb5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:26 client <- Reading packet 1 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b01086ffd3f5cb5, PacketNumber: 1, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 65d6d4b77292eaa77b, InitialSourceConnectionID: 7b01086ffd3f5cb5, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa7f1f4b30798e033741795b513cab7ef, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:26 client -> Sending packet 0 (82 bytes) for connection 65d6d4b77292eaa77b, Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: 7b01086ffd3f5cb5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:26 client Dropping Initial keys. 2025/09/12 06:17:26 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:26 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c3ecbbe8a89eadb4, StatelessResetToken: 0x88f975787a925d20c5f63149d0ec24e5} 2025/09/12 06:17:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2ac805a1848a6e9e, StatelessResetToken: 0x01d6baca1f07289392be3152d2563624} 2025/09/12 06:17:26 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 00305eae284526a4, StatelessResetToken: 0xd3bed073936ef5befa59fe5b266f1cea} 2025/09/12 06:17:26 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:26 client -> Sending packet 0 (40 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 334.335835ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:26 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:26 client -> Sending packet 1 (46 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:26 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:26 client <- Reading packet 2 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b01086ffd3f5cb5, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:26 client -> Sending packet 1 (43 bytes) for connection 65d6d4b77292eaa77b, Handshake 2025/09/12 06:17:26 client Long Header{Type: Handshake, DestConnectionID: c3ecbbe8a89eadb4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:26 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:27 client -> Sending packet 2 (74 bytes) for connection 65d6d4b77292eaa77b, Handshake 2025/09/12 06:17:27 client Long Header{Type: Handshake, DestConnectionID: c3ecbbe8a89eadb4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:27 client -> Sending packet 3 (74 bytes) for connection 65d6d4b77292eaa77b, Handshake 2025/09/12 06:17:27 client Long Header{Type: Handshake, DestConnectionID: c3ecbbe8a89eadb4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:27 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:27 client Dropping Handshake keys. 2025/09/12 06:17:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:27 client -> Sending packet 3 (37 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96.842µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:27 client Skipping packet number 2 2025/09/12 06:17:27 client -> Sending packet 4 (46 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:27 client -> Sending packet 5 (1366 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.PingFrame{} 2025/09/12 06:17:27 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client newly acked packets (1): [5] 2025/09/12 06:17:27 client updated RTT: 31.85466ms (σ: 15.92733ms) 2025/09/12 06:17:27 client ECN capability confirmed. 2025/09/12 06:17:27 client setting loss timer for packet 3 (1-RTT) to 35.836492ms (in 2025-09-12 06:17:27.260387539 +0000 UTC m=+6.767497335) 2025/09/12 06:17:27 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:27.260387539 +0000 UTC m=+6.767497335 2025/09/12 06:17:27 client lost packet 3 (time threshold) 2025/09/12 06:17:27 client lost packet 4 (time threshold) 2025/09/12 06:17:27 client Canceling loss detection timer. 2025/09/12 06:17:27 client -> Sending packet 6 (48 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:27 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7f85d99240d3e407, StatelessResetToken: 0x903712f923cb2d81a07a9331807c9ed9} 2025/09/12 06:17:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:27 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:27 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:27 client -> Sending packet 7 (35 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 92.554µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:27 client -> Sending packet 8 (30 bytes) for connection 65d6d4b77292eaa77b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: c3ecbbe8a89eadb4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:27 client Connection 65d6d4b77292eaa77b closed. 2025/09/12 06:17:27 Requesting https://server4:443/bvcykwdxlc. 2025/09/12 06:17:27 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:27 Increased send buffer size to 14336 kiB 2025/09/12 06:17:27 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:27 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:27 Created qlog file: /logs/qlog/a29e0f9a02dbc9363aecb48a72.sqlog 2025/09/12 06:17:27 client Starting new connection to server4 ([::]:38434 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a29e0f9a02dbc9363aecb48a72, version v1 2025/09/12 06:17:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:27 client -> Sending packet 0 (1280 bytes) for connection a29e0f9a02dbc9363aecb48a72, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: a29e0f9a02dbc9363aecb48a72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 06:17:27 client -> Sending packet 1 (1280 bytes) for connection a29e0f9a02dbc9363aecb48a72, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: a29e0f9a02dbc9363aecb48a72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:27 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60df34e44d6bd687, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:27 client Received first packet. Switching destination connection ID to: 60df34e44d6bd687 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:27 client newly acked packets (1): [0] 2025/09/12 06:17:27 client updated RTT: 31.763018ms (σ: 15.881509ms) 2025/09/12 06:17:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:27 client -> Sending packet 2 (1280 bytes) for connection a29e0f9a02dbc9363aecb48a72, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 60df34e44d6bd687, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 06:17:27 client -> Sending packet 3 (1280 bytes) for connection a29e0f9a02dbc9363aecb48a72, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 60df34e44d6bd687, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 1235, Data length: 282, Offset + Data length: 1517} 2025/09/12 06:17:27 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:27 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60df34e44d6bd687, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 424µs} 2025/09/12 06:17:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:27 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:27 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 60df34e44d6bd687, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 06:17:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a29e0f9a02dbc9363aecb48a72, InitialSourceConnectionID: 60df34e44d6bd687, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x0b0631da998529a7b63cfb4dc2365cc6, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a29e0f9a02dbc9363aecb48a72 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 60df34e44d6bd687, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:27 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client Long Header{Type: Handshake, DestConnectionID: 60df34e44d6bd687, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:27 client Dropping Initial keys. 2025/09/12 06:17:27 client -> Sending packet 1 (43 bytes) for connection a29e0f9a02dbc9363aecb48a72, Handshake 2025/09/12 06:17:27 client Long Header{Type: Handshake, DestConnectionID: 60df34e44d6bd687, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client -> Sending packet 0 (46 bytes) for connection a29e0f9a02dbc9363aecb48a72, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: 60df34e44d6bd687, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:27 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:27 client Dropping Handshake keys. 2025/09/12 06:17:27 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:27 client -> Sending packet 1 (35 bytes) for connection a29e0f9a02dbc9363aecb48a72, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: 60df34e44d6bd687, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 116.158µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:27 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:27 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:27 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:27 client -> Sending packet 2 (35 bytes) for connection a29e0f9a02dbc9363aecb48a72, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: 60df34e44d6bd687, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 97.092µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:27 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:27 client -> Sending packet 3 (30 bytes) for connection a29e0f9a02dbc9363aecb48a72, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:27 client Short Header{DestConnectionID: 60df34e44d6bd687, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:27 client Connection a29e0f9a02dbc9363aecb48a72 closed. 2025/09/12 06:17:27 Requesting https://server4:443/kjzrcqewfw. 2025/09/12 06:17:27 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:27 Increased send buffer size to 14336 kiB 2025/09/12 06:17:27 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:27 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:27 Created qlog file: /logs/qlog/a49caff40fbc5fc49216a7e6834f1e16.sqlog 2025/09/12 06:17:27 client Starting new connection to server4 ([::]:43222 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a49caff40fbc5fc49216a7e6834f1e16, version v1 2025/09/12 06:17:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:27 client -> Sending packet 0 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: a49caff40fbc5fc49216a7e6834f1e16, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:27 client -> Sending packet 1 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: a49caff40fbc5fc49216a7e6834f1e16, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 1232, Data length: 283, Offset + Data length: 1515} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:27 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:27 client Received first packet. Switching destination connection ID to: 267bba0e3d4adcb4 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 104µs} 2025/09/12 06:17:27 client newly acked packets (1): [1] 2025/09/12 06:17:27 client updated RTT: 32.741636ms (σ: 16.370818ms) 2025/09/12 06:17:27 client setting loss timer for packet 0 (Initial) to 36.83434ms (in 2025-09-12 06:17:27.493817575 +0000 UTC m=+7.000927370) 2025/09/12 06:17:27 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:27.493817575 +0000 UTC m=+7.000927370 2025/09/12 06:17:27 client lost packet 0 (time threshold) 2025/09/12 06:17:27 client -> Sending packet 2 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:27 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:27 client -> Sending packet 3 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 06:17:27 client -> Sending packet 4 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 06:17:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:27 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 40µs} 2025/09/12 06:17:27 client <- Reading packet 3 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 16µs} 2025/09/12 06:17:27 client newly acked packets (1): [4] 2025/09/12 06:17:27 client updated RTT: 32.732ms (σ: 12.295ms) 2025/09/12 06:17:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:27 client -> Sending packet 5 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:27 client -> &wire.PingFrame{} 2025/09/12 06:17:27 client <- Reading packet 4 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:27 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 56µs} 2025/09/12 06:17:27 client newly acked packets (1): [5] 2025/09/12 06:17:27 client updated RTT: 32.596ms (σ: 9.492ms) 2025/09/12 06:17:28 client -> Sending packet 6 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:28 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:28 client -> &wire.PingFrame{} 2025/09/12 06:17:28 client Queueing packet (772 bytes) for later decryption 2025/09/12 06:17:28 client Queueing packet (772 bytes) for later decryption 2025/09/12 06:17:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/09/12 06:17:28 client -> Sending packet 7 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:28 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:28 client -> &wire.PingFrame{} 2025/09/12 06:17:28 client -> Sending packet 8 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:28 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:28 client -> &wire.PingFrame{} 2025/09/12 06:17:28 client <- Reading packet 8 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:28 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 1}}, DelayTime: 88µs} 2025/09/12 06:17:28 client newly acked packets (1): [8] 2025/09/12 06:17:28 client updated RTT: 32.634ms (σ: 7.195ms) 2025/09/12 06:17:29 client <- Reading packet 9 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client -> Sending packet 9 (1280 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: 267bba0e3d4adcb4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:29 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, PacketNumber: 1, PacketNumberLen: 1, Length: 755, Version: v1} 2025/09/12 06:17:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 06:17:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a49caff40fbc5fc49216a7e6834f1e16, InitialSourceConnectionID: 267bba0e3d4adcb4, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x2d63946534ef081f479bdd25f60143b6, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:29 client <- Reading packet 2 (772 bytes) for connection (empty), Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 267bba0e3d4adcb4, PacketNumber: 2, PacketNumberLen: 1, Length: 755, Version: v1} 2025/09/12 06:17:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 06:17:29 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 661015fdd25bece7, StatelessResetToken: 0x57de8a812ad623fd0759f93ccea06439} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5acac891a7d5876d, StatelessResetToken: 0xa80a5b7a7b8ba52cf856dacebb694d54} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 53db6e222e49b2ec, StatelessResetToken: 0x6cd68394aa0af1f77388b16d7cea4fa2} 2025/09/12 06:17:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:29 client -> Sending packet 0 (111 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: 661015fdd25bece7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:29 client Dropping Initial keys. 2025/09/12 06:17:29 client -> Sending packet 1 (38 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.502877977s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client -> Sending packet 2 (46 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:29 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/09/12 06:17:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:29 client -> Sending packet 1 (74 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: 661015fdd25bece7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:29 client -> Sending packet 2 (74 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: 661015fdd25bece7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:29 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:29 client Dropping Handshake keys. 2025/09/12 06:17:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:29 client -> Sending packet 4 (37 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 124.794µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:29 client Skipping packet number 3 2025/09/12 06:17:29 client -> Sending packet 5 (46 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:29 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client newly acked packets (1): [5] 2025/09/12 06:17:29 client updated RTT: 32.41ms (σ: 5.843ms) 2025/09/12 06:17:29 client ECN capability confirmed. 2025/09/12 06:17:29 client setting loss timer for packet 4 (1-RTT) to 36.46125ms (in 2025-09-12 06:17:29.15986535 +0000 UTC m=+8.666975156) 2025/09/12 06:17:29 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:29 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:29 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:29 client -> Sending packet 6 (35 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 44.611µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:29 client -> Sending packet 7 (30 bytes) for connection a49caff40fbc5fc49216a7e6834f1e16, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 661015fdd25bece7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:29 client Connection a49caff40fbc5fc49216a7e6834f1e16 closed. 2025/09/12 06:17:29 Requesting https://server4:443/siukqmagtg. 2025/09/12 06:17:29 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:29 Increased send buffer size to 14336 kiB 2025/09/12 06:17:29 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:29 Created qlog file: /logs/qlog/a2fe306a9450af35d28fccda430db53f4bd1ba.sqlog 2025/09/12 06:17:29 client Starting new connection to server4 ([::]:37370 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a2fe306a9450af35d28fccda430db53f4bd1ba, version v1 2025/09/12 06:17:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:29 client -> Sending packet 0 (1280 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: a2fe306a9450af35d28fccda430db53f4bd1ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:29 client -> Sending packet 1 (1280 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: a2fe306a9450af35d28fccda430db53f4bd1ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 1229, Data length: 288, Offset + Data length: 1517} 2025/09/12 06:17:29 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8db0b00c3bb019c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:29 client Received first packet. Switching destination connection ID to: a8db0b00c3bb019c 2025/09/12 06:17:29 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112µs} 2025/09/12 06:17:29 client newly acked packets (1): [1] 2025/09/12 06:17:29 client updated RTT: 32.737205ms (σ: 16.368602ms) 2025/09/12 06:17:29 client setting loss timer for packet 0 (Initial) to 36.829355ms (in 2025-09-12 06:17:29.19306923 +0000 UTC m=+8.700179026) 2025/09/12 06:17:29 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:29.19306923 +0000 UTC m=+8.700179026 2025/09/12 06:17:29 client lost packet 0 (time threshold) 2025/09/12 06:17:29 client -> Sending packet 2 (1280 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:29 client -> Sending packet 3 (1280 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:29 client -> Sending packet 4 (1280 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:29 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:29 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8db0b00c3bb019c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:29 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 336µs} 2025/09/12 06:17:29 client newly acked packets (1): [4] 2025/09/12 06:17:29 client updated RTT: 32.904ms (σ: 12.61ms) 2025/09/12 06:17:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:29 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8db0b00c3bb019c, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 06:17:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a2fe306a9450af35d28fccda430db53f4bd1ba, InitialSourceConnectionID: a8db0b00c3bb019c, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x3c655f15c15d31d62d77e6fed429acaa, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:29 client Dropping Initial keys. 2025/09/12 06:17:29 client -> Sending packet 1 (43 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client -> Sending packet 0 (46 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: a8db0b00c3bb019c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:29 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:29 client -> Sending packet 2 (74 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:29 client -> Sending packet 3 (74 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, Handshake 2025/09/12 06:17:29 client Long Header{Type: Handshake, DestConnectionID: a8db0b00c3bb019c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:29 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:29 client Dropping Handshake keys. 2025/09/12 06:17:29 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:29 client -> Sending packet 2 (54 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: a8db0b00c3bb019c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 102.142µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:29 client -> Sending packet 3 (46 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: a8db0b00c3bb019c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:29 client <- Reading packet 2 (110 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 61f7909bbaf1b34b, StatelessResetToken: 0xa16db84d6332b8769ccc55e840aa93ee} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c576b23380345ae6, StatelessResetToken: 0x1f0b561faad222252ab31ca378ec062b} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f42daff713b98af, StatelessResetToken: 0x30a257f6a9448a76256b85b337f3cd4d} 2025/09/12 06:17:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:29 client -> Sending packet 4 (37 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 3f42daff713b98af, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 130.025µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:29 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:29 client -> Sending packet 5 (37 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 3f42daff713b98af, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 61.997µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client <- Reading packet 5 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.552ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client newly acked packets (1): [3] 2025/09/12 06:17:29 client updated RTT: 35.842ms (σ: 15.334ms) 2025/09/12 06:17:29 client ECN capability confirmed. 2025/09/12 06:17:29 client <- Reading packet 6 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 487fe785e56f2ea9, StatelessResetToken: 0x8b0e948b96c51e1f40f781a5b41d763a} 2025/09/12 06:17:29 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:29 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:29 client -> Sending packet 6 (38 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 3f42daff713b98af, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 25.277574ms, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:29 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:29 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:29 client -> Sending packet 7 (39 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 3f42daff713b98af, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 106.58µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:29 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:29 client -> Sending packet 8 (30 bytes) for connection a2fe306a9450af35d28fccda430db53f4bd1ba, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:29 client Short Header{DestConnectionID: 3f42daff713b98af, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:29 client Connection a2fe306a9450af35d28fccda430db53f4bd1ba closed. 2025/09/12 06:17:29 Requesting https://server4:443/xoyjovyiov. 2025/09/12 06:17:29 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:29 Increased send buffer size to 14336 kiB 2025/09/12 06:17:29 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:29 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:29 Created qlog file: /logs/qlog/7f82d86e17a1276294ba03af74d3.sqlog 2025/09/12 06:17:29 client Starting new connection to server4 ([::]:47252 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7f82d86e17a1276294ba03af74d3, version v1 2025/09/12 06:17:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:29 client -> Sending packet 0 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: 7f82d86e17a1276294ba03af74d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:29 client -> Sending packet 1 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: 7f82d86e17a1276294ba03af74d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 1234, Data length: 280, Offset + Data length: 1514} 2025/09/12 06:17:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:29 client -> Sending packet 2 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: 7f82d86e17a1276294ba03af74d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:29 client -> Sending packet 3 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: 7f82d86e17a1276294ba03af74d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 1234, Data length: 280, Offset + Data length: 1514} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:29 client <- Reading packet 1 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b7c9d9331f6c65d0, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:29 client Received first packet. Switching destination connection ID to: b7c9d9331f6c65d0 2025/09/12 06:17:29 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/09/12 06:17:29 client newly acked packets (1): [2] 2025/09/12 06:17:29 client updated RTT: 31.985266ms (σ: 15.992633ms) 2025/09/12 06:17:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:29 client -> Sending packet 4 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: b7c9d9331f6c65d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 1234, Data length: 280, Offset + Data length: 1514} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:29 client -> Sending packet 5 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:29 client Long Header{Type: Initial, DestConnectionID: b7c9d9331f6c65d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:29 client -> &wire.CryptoFrame{Offset: 1234, Data length: 280, Offset + Data length: 1514} 2025/09/12 06:17:29 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:30 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b7c9d9331f6c65d0, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client -> Sending packet 6 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: b7c9d9331f6c65d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:30 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b7c9d9331f6c65d0, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:30 client -> Sending packet 7 (1280 bytes) for connection 7f82d86e17a1276294ba03af74d3, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: b7c9d9331f6c65d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 1 (771 bytes) for connection (empty), Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b7c9d9331f6c65d0, PacketNumber: 1, PacketNumberLen: 1, Length: 754, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 06:17:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7f82d86e17a1276294ba03af74d3, InitialSourceConnectionID: b7c9d9331f6c65d0, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x732b0056a8b68dc688943ea23b775c38, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:30 client -> Sending packet 0 (82 bytes) for connection 7f82d86e17a1276294ba03af74d3, Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: b7c9d9331f6c65d0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:30 client Dropping Initial keys. 2025/09/12 06:17:30 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b77f90f8fe93531, StatelessResetToken: 0x758ba538d96a21ecf37e19a51bd3bccc} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1457a068af7f53ee, StatelessResetToken: 0xbd433a4ebc7110434cf0f250a70786c5} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 486fe7fbd387c7e4, StatelessResetToken: 0x00d1e2bd84a9b252b8384e38c4010489} 2025/09/12 06:17:30 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:30 client -> Sending packet 0 (59 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 335.23206ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:30 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b7c9d9331f6c65d0, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 06:17:30 client -> Sending packet 1 (43 bytes) for connection 7f82d86e17a1276294ba03af74d3, Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: 0b77f90f8fe93531, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:30 client Dropping Handshake keys. 2025/09/12 06:17:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:30 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:30 client -> Sending packet 1 (36 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.34038ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:30 client -> Sending packet 3 (48 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:30 client -> Sending packet 4 (48 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:30 client <- Reading packet 2 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 486fe7fbd387c7e4, StatelessResetToken: 0x00d1e2bd84a9b252b8384e38c4010489} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1457a068af7f53ee, StatelessResetToken: 0xbd433a4ebc7110434cf0f250a70786c5} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b77f90f8fe93531, StatelessResetToken: 0x758ba538d96a21ecf37e19a51bd3bccc} 2025/09/12 06:17:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:30 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:30 client -> Sending packet 5 (35 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 121.288µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b8203eb7f5efcf08, StatelessResetToken: 0xa73e4ad2533d3ced509817ec6e14a9e8} 2025/09/12 06:17:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:30 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:30 client -> Sending packet 6 (35 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 65.053µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 7 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:30 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:30 client -> Sending packet 7 (30 bytes) for connection 7f82d86e17a1276294ba03af74d3, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 0b77f90f8fe93531, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:30 client Connection 7f82d86e17a1276294ba03af74d3 closed. 2025/09/12 06:17:30 Requesting https://server4:443/geynjwwsls. 2025/09/12 06:17:30 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:30 Increased send buffer size to 14336 kiB 2025/09/12 06:17:30 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:30 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:30 Created qlog file: /logs/qlog/243099d4822231f1b25c4916ff92d1.sqlog 2025/09/12 06:17:30 client Starting new connection to server4 ([::]:39148 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 243099d4822231f1b25c4916ff92d1, version v1 2025/09/12 06:17:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:30 client -> Sending packet 0 (1280 bytes) for connection 243099d4822231f1b25c4916ff92d1, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: 243099d4822231f1b25c4916ff92d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:30 client -> Sending packet 1 (1280 bytes) for connection 243099d4822231f1b25c4916ff92d1, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: 243099d4822231f1b25c4916ff92d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:30 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:30 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e2eb0a81601a78d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:30 client Received first packet. Switching destination connection ID to: 5e2eb0a81601a78d 2025/09/12 06:17:30 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 336µs} 2025/09/12 06:17:30 client newly acked packets (2): [0 1] 2025/09/12 06:17:30 client updated RTT: 33.829608ms (σ: 16.914804ms) 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:30 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e2eb0a81601a78d, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 732, Offset + Data length: 732} 2025/09/12 06:17:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 243099d4822231f1b25c4916ff92d1, InitialSourceConnectionID: 5e2eb0a81601a78d, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x0dfa8646cf28ae293d8bafaed5cafbde, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:30 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f902813ce5f6be2b, StatelessResetToken: 0x0c14854630d14ad840e6a1f69b9a15e1} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4a546c52bd63017d, StatelessResetToken: 0xa9d0f5d8b5f0ce23dcce3ea225ce2676} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 36f1c46e8b9ade2e, StatelessResetToken: 0xf3edd578a18504319eb7a67b9eac8bb0} 2025/09/12 06:17:30 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 243099d4822231f1b25c4916ff92d1 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: f902813ce5f6be2b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: f902813ce5f6be2b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:30 client Short Header{DestConnectionID: f902813ce5f6be2b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:30 client Dropping Initial keys. 2025/09/12 06:17:30 client -> Sending packet 1 (89 bytes) for connection 243099d4822231f1b25c4916ff92d1, Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: f902813ce5f6be2b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client Short Header{DestConnectionID: f902813ce5f6be2b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:30 client -> Sending packet 2 (36 bytes) for connection 243099d4822231f1b25c4916ff92d1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: f902813ce5f6be2b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 686.219µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 1 (24 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:30 client Dropping Handshake keys. 2025/09/12 06:17:30 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs} 2025/09/12 06:17:30 client newly acked packets (2): [0 1] 2025/09/12 06:17:30 client updated RTT: 33.564ms (σ: 13.214ms) 2025/09/12 06:17:30 client Canceling loss detection timer. 2025/09/12 06:17:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:30 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:30 client -> Sending packet 3 (37 bytes) for connection 243099d4822231f1b25c4916ff92d1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: f902813ce5f6be2b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 60.855µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f3a134ce90b43e84, StatelessResetToken: 0x6f5db5516295be2113eed7b1cc65705d} 2025/09/12 06:17:30 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:30 client -> Sending packet 4 (39 bytes) for connection 243099d4822231f1b25c4916ff92d1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: f902813ce5f6be2b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 71.725µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:30 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:30 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:30 client -> Sending packet 5 (30 bytes) for connection 243099d4822231f1b25c4916ff92d1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: f902813ce5f6be2b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:30 client Connection 243099d4822231f1b25c4916ff92d1 closed. 2025/09/12 06:17:30 Requesting https://server4:443/vfycyxjfqm. 2025/09/12 06:17:30 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:30 Increased send buffer size to 14336 kiB 2025/09/12 06:17:30 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:30 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:30 Created qlog file: /logs/qlog/f9bbfb3e68333bb7c59c5ebf6b.sqlog 2025/09/12 06:17:30 client Starting new connection to server4 ([::]:60811 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f9bbfb3e68333bb7c59c5ebf6b, version v1 2025/09/12 06:17:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:30 client -> Sending packet 0 (1280 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: f9bbfb3e68333bb7c59c5ebf6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:30 client -> Sending packet 1 (1280 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: f9bbfb3e68333bb7c59c5ebf6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 1235, Data length: 280, Offset + Data length: 1515} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:30 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:30 client -> Sending packet 2 (1280 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: f9bbfb3e68333bb7c59c5ebf6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:30 client -> Sending packet 3 (1280 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: f9bbfb3e68333bb7c59c5ebf6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 1235, Data length: 280, Offset + Data length: 1515} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:30 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34154bbd43a61d39, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:30 client Received first packet. Switching destination connection ID to: 34154bbd43a61d39 2025/09/12 06:17:30 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs} 2025/09/12 06:17:30 client newly acked packets (1): [2] 2025/09/12 06:17:30 client updated RTT: 31.862544ms (σ: 15.931272ms) 2025/09/12 06:17:30 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:30 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34154bbd43a61d39, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client -> Sending packet 4 (1280 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: 34154bbd43a61d39, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:30 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34154bbd43a61d39, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:30 client -> Sending packet 5 (1280 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Initial 2025/09/12 06:17:30 client Long Header{Type: Initial, DestConnectionID: 34154bbd43a61d39, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client <- Reading packet 1 (769 bytes) for connection (empty), Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34154bbd43a61d39, PacketNumber: 1, PacketNumberLen: 1, Length: 752, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f9bbfb3e68333bb7c59c5ebf6b, InitialSourceConnectionID: 34154bbd43a61d39, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x6cbbefb6de83cb770503d75a0210523b, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:30 client -> Sending packet 0 (82 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: 34154bbd43a61d39, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:30 client Dropping Initial keys. 2025/09/12 06:17:30 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:30 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40cc7753ec0e5646, StatelessResetToken: 0xbfb816525de8163e934469bce4ac6dd4} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fc760f8dba8e5a7e, StatelessResetToken: 0xb3e423590f1d01858cddc098b470a5bf} 2025/09/12 06:17:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c9c37630065ef7d, StatelessResetToken: 0x6e80163ed4fe139948a77c647159f869} 2025/09/12 06:17:30 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:30 client <- Reading packet 2 (769 bytes) for connection (empty), Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34154bbd43a61d39, PacketNumber: 2, PacketNumberLen: 1, Length: 752, Version: v1} 2025/09/12 06:17:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:30 client -> Sending packet 1 (91 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Handshake 2025/09/12 06:17:30 client Long Header{Type: Handshake, DestConnectionID: 40cc7753ec0e5646, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:30 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:30 client -> Sending packet 1 (38 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:30 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 334.695958ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client <- Reading packet 4 (769 bytes) for connection (empty), Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34154bbd43a61d39, PacketNumber: 4, PacketNumberLen: 1, Length: 752, Version: v1} 2025/09/12 06:17:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:31 client -> Sending packet 2 (45 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 40cc7753ec0e5646, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:31 client -> Sending packet 3 (74 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 40cc7753ec0e5646, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:31 client -> Sending packet 4 (74 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 40cc7753ec0e5646, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:31 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:31 client Dropping Handshake keys. 2025/09/12 06:17:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:31 client -> Sending packet 3 (56 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 102.623µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client -> Sending packet 4 (48 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b2c35bb4f141718d, StatelessResetToken: 0x6aaf7e504f9d1fe889a17bcee02b192c} 2025/09/12 06:17:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:31 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:31 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:31 client -> Sending packet 5 (37 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 59.071µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 06:17:31 client -> Sending packet 7 (48 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client -> Sending packet 8 (48 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client -> Sending packet 9 (1366 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.PingFrame{} 2025/09/12 06:17:31 client <- Reading packet 8 (28 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 3, Smallest: 3}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client newly acked packets (1): [8] 2025/09/12 06:17:31 client updated RTT: 31.744ms (σ: 12.183ms) 2025/09/12 06:17:31 client ECN capability confirmed. 2025/09/12 06:17:31 client Canceling loss detection timer. 2025/09/12 06:17:31 client <- Reading packet 12 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b2c35bb4f141718d, StatelessResetToken: 0x6aaf7e504f9d1fe889a17bcee02b192c} 2025/09/12 06:17:31 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:31 client -> Sending packet 10 (41 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 111.55µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client <- Reading packet 13 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:31 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:31 client -> Sending packet 11 (30 bytes) for connection f9bbfb3e68333bb7c59c5ebf6b, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 40cc7753ec0e5646, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:31 client Connection f9bbfb3e68333bb7c59c5ebf6b closed. 2025/09/12 06:17:31 Requesting https://server4:443/qhpvcdxsuk. 2025/09/12 06:17:31 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:31 Increased send buffer size to 14336 kiB 2025/09/12 06:17:31 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:31 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:31 Created qlog file: /logs/qlog/bda947e2eab41d0a6e1822.sqlog 2025/09/12 06:17:31 client Starting new connection to server4 ([::]:55437 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bda947e2eab41d0a6e1822, version v1 2025/09/12 06:17:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:31 client -> Sending packet 0 (1280 bytes) for connection bda947e2eab41d0a6e1822, Initial 2025/09/12 06:17:31 client Long Header{Type: Initial, DestConnectionID: bda947e2eab41d0a6e1822, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:31 client -> Sending packet 1 (1280 bytes) for connection bda947e2eab41d0a6e1822, Initial 2025/09/12 06:17:31 client Long Header{Type: Initial, DestConnectionID: bda947e2eab41d0a6e1822, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 1237, Data length: 268, Offset + Data length: 1505} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:31 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d2a9dda6f2cb933, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:31 client Received first packet. Switching destination connection ID to: 1d2a9dda6f2cb933 2025/09/12 06:17:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 120µs} 2025/09/12 06:17:31 client newly acked packets (1): [0] 2025/09/12 06:17:31 client updated RTT: 31.881643ms (σ: 15.940821ms) 2025/09/12 06:17:31 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:31 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d2a9dda6f2cb933, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:31 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 344µs} 2025/09/12 06:17:31 client newly acked packets (1): [1] 2025/09/12 06:17:31 client updated RTT: 32.128ms (σ: 12.45ms) 2025/09/12 06:17:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:31 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:31 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1d2a9dda6f2cb933, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 06:17:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bda947e2eab41d0a6e1822, InitialSourceConnectionID: 1d2a9dda6f2cb933, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x832916a9c896f209b1b8c0bf638ccb2a, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bda947e2eab41d0a6e1822 2025/09/12 06:17:31 client Long Header{Type: Initial, DestConnectionID: 1d2a9dda6f2cb933, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 1d2a9dda6f2cb933, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:31 client Dropping Initial keys. 2025/09/12 06:17:31 client -> Sending packet 1 (89 bytes) for connection bda947e2eab41d0a6e1822, Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 1d2a9dda6f2cb933, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client Short Header{DestConnectionID: 1d2a9dda6f2cb933, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:31 client -> Sending packet 2 (74 bytes) for connection bda947e2eab41d0a6e1822, Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 1d2a9dda6f2cb933, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:31 client -> Sending packet 3 (74 bytes) for connection bda947e2eab41d0a6e1822, Handshake 2025/09/12 06:17:31 client Long Header{Type: Handshake, DestConnectionID: 1d2a9dda6f2cb933, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:31 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:31 client Dropping Handshake keys. 2025/09/12 06:17:31 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:31 client -> Sending packet 2 (54 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 1d2a9dda6f2cb933, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 106.42µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client -> Sending packet 3 (46 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 1d2a9dda6f2cb933, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:31 client <- Reading packet 2 (110 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client newly acked packets (1): [3] 2025/09/12 06:17:31 client updated RTT: 31.976ms (σ: 9.64ms) 2025/09/12 06:17:31 client ECN capability confirmed. 2025/09/12 06:17:31 client Canceling loss detection timer. 2025/09/12 06:17:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 475e4413ebbbfeff, StatelessResetToken: 0xdef48f4cdb739f9dd34312a1fcfb5245} 2025/09/12 06:17:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f82b3fc9cf3f4f8b, StatelessResetToken: 0xc54d50b127dccb8213e29fcebf446a58} 2025/09/12 06:17:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 22a5e056ebcbaf4f, StatelessResetToken: 0xb785626c3f292f065c1c3c55ea0fdd09} 2025/09/12 06:17:31 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:31 client -> Sending packet 4 (37 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:31 client Short Header{DestConnectionID: 22a5e056ebcbaf4f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 148.379µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:32 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 432d31fb94626959, StatelessResetToken: 0x09bbd52eae4e95e0c7489866c49dc133} 2025/09/12 06:17:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:32 client -> Sending packet 5 (37 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 22a5e056ebcbaf4f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 93.536µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client <- Reading packet 6 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 26.216ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client newly acked packets (1): [4] 2025/09/12 06:17:32 client updated RTT: 31.952ms (σ: 7.277ms) 2025/09/12 06:17:32 client Canceling loss detection timer. 2025/09/12 06:17:32 client Ignoring all packets below 3. 2025/09/12 06:17:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:32 client <- Reading packet 8 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.PingFrame{} 2025/09/12 06:17:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:32 client <- Reading packet 9 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.PingFrame{} 2025/09/12 06:17:32 client -> Sending packet 6 (1366 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 22a5e056ebcbaf4f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.PingFrame{} 2025/09/12 06:17:32 client -> Sending packet 7 (37 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 22a5e056ebcbaf4f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 154.972µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client <- Reading packet 11 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.PingFrame{} 2025/09/12 06:17:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:32 client <- Reading packet 12 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.PingFrame{} 2025/09/12 06:17:32 client -> Sending packet 8 (39 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 22a5e056ebcbaf4f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 5, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 119.935µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client <- Reading packet 13 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:32 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:32 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:32 client -> Sending packet 9 (30 bytes) for connection bda947e2eab41d0a6e1822, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 22a5e056ebcbaf4f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:32 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:32 client Connection bda947e2eab41d0a6e1822 closed. 2025/09/12 06:17:32 Requesting https://server4:443/aiimebgsrx. 2025/09/12 06:17:32 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:32 Increased send buffer size to 14336 kiB 2025/09/12 06:17:32 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:32 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:32 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:32 Created qlog file: /logs/qlog/89360027a4759810246d2815cd02f2ece6e4d0c0.sqlog 2025/09/12 06:17:32 client Starting new connection to server4 ([::]:48121 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 89360027a4759810246d2815cd02f2ece6e4d0c0, version v1 2025/09/12 06:17:32 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:32 client -> Sending packet 0 (1280 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, Initial 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: 89360027a4759810246d2815cd02f2ece6e4d0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 06:17:32 client -> Sending packet 1 (1280 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, Initial 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: 89360027a4759810246d2815cd02f2ece6e4d0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 1228, Data length: 276, Offset + Data length: 1504} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:32 client -> Sending packet 2 (1280 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, Initial 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: 89360027a4759810246d2815cd02f2ece6e4d0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 06:17:32 client -> Sending packet 3 (1280 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, Initial 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: 89360027a4759810246d2815cd02f2ece6e4d0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 1228, Data length: 276, Offset + Data length: 1504} 2025/09/12 06:17:32 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d59d77c2278ff6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:32 client Received first packet. Switching destination connection ID to: 9d59d77c2278ff6e 2025/09/12 06:17:32 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 128µs} 2025/09/12 06:17:32 client newly acked packets (1): [2] 2025/09/12 06:17:32 client updated RTT: 31.961062ms (σ: 15.980531ms) 2025/09/12 06:17:32 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:32 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d59d77c2278ff6e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:32 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 304µs} 2025/09/12 06:17:32 client newly acked packets (1): [3] 2025/09/12 06:17:32 client updated RTT: 32.208ms (σ: 12.48ms) 2025/09/12 06:17:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:32 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:32 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:32 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:32 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:32 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9d59d77c2278ff6e, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:32 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 06:17:32 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:32 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:32 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 89360027a4759810246d2815cd02f2ece6e4d0c0, InitialSourceConnectionID: 9d59d77c2278ff6e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xdd2dd7c1ae3cea5d9ec3927880723691, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:32 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0 2025/09/12 06:17:32 client Long Header{Type: Initial, DestConnectionID: 9d59d77c2278ff6e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client Long Header{Type: Handshake, DestConnectionID: 9d59d77c2278ff6e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:32 client Dropping Initial keys. 2025/09/12 06:17:32 client -> Sending packet 1 (43 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, Handshake 2025/09/12 06:17:32 client Long Header{Type: Handshake, DestConnectionID: 9d59d77c2278ff6e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client -> Sending packet 0 (46 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d59d77c2278ff6e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:32 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:32 client Dropping Handshake keys. 2025/09/12 06:17:32 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:32 client -> Sending packet 1 (35 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d59d77c2278ff6e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 73.609µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client <- Reading packet 4 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 25.496ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client newly acked packets (1): [0] 2025/09/12 06:17:32 client updated RTT: 32.208ms (σ: 9.361ms) 2025/09/12 06:17:32 client ECN capability confirmed. 2025/09/12 06:17:32 client Canceling loss detection timer. 2025/09/12 06:17:32 client <- Reading packet 5 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 688e10b47532573e, StatelessResetToken: 0x9b87fa90e152b9cb109e961f763d7cdf} 2025/09/12 06:17:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 000dac84bf5b979e, StatelessResetToken: 0x8daf2c13ba1e56cc01f34a86e3b977a3} 2025/09/12 06:17:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d658746f8bbcabe, StatelessResetToken: 0xde22a619a00ff5a309d1f56a58c88b6d} 2025/09/12 06:17:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:32 client -> Sending packet 2 (39 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 132.519µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:32 client <- Reading packet 8 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:32 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:32 client -> Sending packet 3 (39 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 84.649µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:32 client -> Sending packet 5 (29 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:32 client -> Sending packet 6 (29 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:32 client -> Sending packet 7 (1366 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.PingFrame{} 2025/09/12 06:17:32 client <- Reading packet 9 (28 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 48µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client newly acked packets (1): [6] 2025/09/12 06:17:32 client updated RTT: 32.051ms (σ: 7.333ms) 2025/09/12 06:17:32 client Canceling loss detection timer. 2025/09/12 06:17:32 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:32 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:32 client <- Reading packet 11 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:32 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:32 client -> Sending packet 8 (39 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:32 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:32 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 115.116µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client <- Reading packet 12 (29 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:32 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:32 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 25.32ms, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:32 client newly acked packets (1): [7] 2025/09/12 06:17:32 client updated RTT: 32.074ms (σ: 5.546ms) 2025/09/12 06:17:33 client <- Reading packet 13 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:33 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:33 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:33 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:33 client -> Sending packet 9 (1409 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:33 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:33 client -> &wire.PingFrame{} 2025/09/12 06:17:33 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:33 client -> Sending packet 10 (40 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:33 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:33 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 1, AckRanges: {{Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.417101ms, ECT0: 9, ECT1: 0, CE: 0} 2025/09/12 06:17:33 client <- Reading packet 15 (30 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:33 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:33 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 56µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:33 client newly acked packets (1): [9] 2025/09/12 06:17:33 client updated RTT: 32.032ms (σ: 4.242ms) 2025/09/12 06:17:33 client <- Reading packet 16 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:33 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:33 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:33 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:33 client -> Sending packet 11 (1430 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:33 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:33 client -> &wire.PingFrame{} 2025/09/12 06:17:33 client -> Sending packet 12 (41 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:33 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:33 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 1, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 156.313µs, ECT0: 11, ECT1: 0, CE: 0} 2025/09/12 06:17:33 client <- Reading packet 20 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:33 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:33 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:33 client -> Sending packet 13 (43 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:33 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:33 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 1, AckRanges: {{Largest: 20, Smallest: 20}, {Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 118.262µs, ECT0: 12, ECT1: 0, CE: 0} 2025/09/12 06:17:33 client <- Reading packet 21 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:33 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:33 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:33 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:33 client -> Sending packet 14 (44 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:33 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:33 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 1, AckRanges: {{Largest: 21, Smallest: 20}, {Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.332926ms, ECT0: 13, ECT1: 0, CE: 0} 2025/09/12 06:17:34 client <- Reading packet 23 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:34 client Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:34 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:34 client <- Reading packet 24 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:34 client Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:34 client -> Sending packet 15 (45 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:34 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:34 client -> &wire.AckFrame{LargestAcked: 24, LowestAcked: 1, AckRanges: {{Largest: 24, Smallest: 23}, {Largest: 21, Smallest: 20}, {Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 136.066µs, ECT0: 15, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 25 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 01cc258285bab396, StatelessResetToken: 0x5cc1fa39812c8bcf6601373b5a76cc66} 2025/09/12 06:17:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:35 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:35 client -> Sending packet 16 (46 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 1, AckRanges: {{Largest: 25, Smallest: 23}, {Largest: 21, Smallest: 20}, {Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.313259ms, ECT0: 16, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 27 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:35 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:35 client -> Sending packet 17 (47 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 1, AckRanges: {{Largest: 27, Smallest: 27}, {Largest: 25, Smallest: 23}, {Largest: 21, Smallest: 20}, {Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 73.438µs, ECT0: 17, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:35 client -> Sending packet 18 (30 bytes) for connection 89360027a4759810246d2815cd02f2ece6e4d0c0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 9d658746f8bbcabe, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:35 client Connection 89360027a4759810246d2815cd02f2ece6e4d0c0 closed. 2025/09/12 06:17:35 Requesting https://server4:443/gvishdeljf. 2025/09/12 06:17:35 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:35 Increased send buffer size to 14336 kiB 2025/09/12 06:17:35 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:35 Created qlog file: /logs/qlog/cb0548ab55358584.sqlog 2025/09/12 06:17:35 client Starting new connection to server4 ([::]:55109 -> 193.167.100.100:443), source connection ID (empty), destination connection ID cb0548ab55358584, version v1 2025/09/12 06:17:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:35 client -> Sending packet 0 (1280 bytes) for connection cb0548ab55358584, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: cb0548ab55358584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:35 client -> Sending packet 1 (1280 bytes) for connection cb0548ab55358584, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: cb0548ab55358584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1240, Data length: 276, Offset + Data length: 1516} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:35 client -> Sending packet 2 (1280 bytes) for connection cb0548ab55358584, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: cb0548ab55358584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:35 client -> Sending packet 3 (1280 bytes) for connection cb0548ab55358584, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: cb0548ab55358584, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1240, Data length: 276, Offset + Data length: 1516} 2025/09/12 06:17:35 client <- Reading packet 1 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4fc740f5919c59a3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:35 client Received first packet. Switching destination connection ID to: 4fc740f5919c59a3 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/09/12 06:17:35 client newly acked packets (1): [2] 2025/09/12 06:17:35 client updated RTT: 31.79075ms (σ: 15.895375ms) 2025/09/12 06:17:35 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:35 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4fc740f5919c59a3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 352µs} 2025/09/12 06:17:35 client newly acked packets (1): [3] 2025/09/12 06:17:35 client updated RTT: 32.057ms (σ: 12.456ms) 2025/09/12 06:17:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:35 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4fc740f5919c59a3, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/09/12 06:17:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: cb0548ab55358584, InitialSourceConnectionID: 4fc740f5919c59a3, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa2c0cbb2bfe6071eb89a10e6220265c9, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection cb0548ab55358584 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: 4fc740f5919c59a3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: 4fc740f5919c59a3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:35 client Dropping Initial keys. 2025/09/12 06:17:35 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d000f9c9940d2370, StatelessResetToken: 0xa824733edf6c137c2f7a06d251ff4df4} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eceb6e79c0e4d769, StatelessResetToken: 0x2df37ec92c956caae1132b142ccee22b} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 72047d89cbbbf665, StatelessResetToken: 0x96e31f6dc5396bea450360c7048251e9} 2025/09/12 06:17:35 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:35 client -> Sending packet 1 (91 bytes) for connection cb0548ab55358584, Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: d000f9c9940d2370, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client -> Sending packet 1 (36 bytes) for connection cb0548ab55358584, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 726.781µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:35 client -> Sending packet 2 (74 bytes) for connection cb0548ab55358584, Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: d000f9c9940d2370, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:35 client -> Sending packet 3 (74 bytes) for connection cb0548ab55358584, Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: d000f9c9940d2370, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:35 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:35 client Dropping Handshake keys. 2025/09/12 06:17:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:35 client -> Sending packet 3 (56 bytes) for connection cb0548ab55358584, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 93.245µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client -> Sending packet 4 (48 bytes) for connection cb0548ab55358584, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 55564069f26ceb4b, StatelessResetToken: 0x95382b892cecf0dcb5b6add96a66a71f} 2025/09/12 06:17:35 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:35 client -> Sending packet 5 (37 bytes) for connection cb0548ab55358584, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 83.907µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:35 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:35 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:35 client -> Sending packet 6 (37 bytes) for connection cb0548ab55358584, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 48.233µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:35 client -> Sending packet 7 (30 bytes) for connection cb0548ab55358584, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: d000f9c9940d2370, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:35 client Connection cb0548ab55358584 closed. 2025/09/12 06:17:35 Requesting https://server4:443/nxyfyogtbf. 2025/09/12 06:17:35 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:35 Increased send buffer size to 14336 kiB 2025/09/12 06:17:35 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:35 Created qlog file: /logs/qlog/abc825c0b3925b8c083608b9548a142b19c2.sqlog 2025/09/12 06:17:35 client Starting new connection to server4 ([::]:45266 -> 193.167.100.100:443), source connection ID (empty), destination connection ID abc825c0b3925b8c083608b9548a142b19c2, version v1 2025/09/12 06:17:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:35 client -> Sending packet 0 (1280 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: abc825c0b3925b8c083608b9548a142b19c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 06:17:35 client -> Sending packet 1 (1280 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: abc825c0b3925b8c083608b9548a142b19c2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1230, Data length: 279, Offset + Data length: 1509} 2025/09/12 06:17:35 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c8cd8dbde08e6baf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:35 client Received first packet. Switching destination connection ID to: c8cd8dbde08e6baf 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120µs} 2025/09/12 06:17:35 client newly acked packets (1): [1] 2025/09/12 06:17:35 client updated RTT: 32.778534ms (σ: 16.389267ms) 2025/09/12 06:17:35 client setting loss timer for packet 0 (Initial) to 36.87585ms (in 2025-09-12 06:17:35.507502398 +0000 UTC m=+15.014612194) 2025/09/12 06:17:35 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:35.507502398 +0000 UTC m=+15.014612194 2025/09/12 06:17:35 client lost packet 0 (time threshold) 2025/09/12 06:17:35 client -> Sending packet 2 (1280 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: c8cd8dbde08e6baf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:35 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:35 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c8cd8dbde08e6baf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 416µs} 2025/09/12 06:17:35 client newly acked packets (1): [2] 2025/09/12 06:17:35 client updated RTT: 32.826ms (σ: 12.389ms) 2025/09/12 06:17:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:35 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c8cd8dbde08e6baf, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 06:17:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: abc825c0b3925b8c083608b9548a142b19c2, InitialSourceConnectionID: c8cd8dbde08e6baf, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x4a1814edce32c2be213f92ba5932b01e, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:35 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3106a5305745f5c8, StatelessResetToken: 0xfd8b0ff985b021c0aec1c02bdf90c735} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8a1105ee997c896, StatelessResetToken: 0x8e7ec7a927cecd4eea05ebda2ab5fc4a} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ead3e5dea0d733e, StatelessResetToken: 0x7342de2bc7ba1d01e74a2210f3be4f9e} 2025/09/12 06:17:35 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: 3106a5305745f5c8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: 3106a5305745f5c8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:35 client Dropping Initial keys. 2025/09/12 06:17:35 client -> Sending packet 1 (89 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: 3106a5305745f5c8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client -> Sending packet 2 (36 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 985.502µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:35 client Dropping Handshake keys. 2025/09/12 06:17:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:35 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:35 client -> Sending packet 3 (36 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.319162ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 3 (29 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 26.232ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client newly acked packets (1): [0] 2025/09/12 06:17:35 client lost packet 1 (time threshold) 2025/09/12 06:17:35 client Canceling loss detection timer. 2025/09/12 06:17:35 client -> Sending packet 4 (46 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 61f7313640bdae5c, StatelessResetToken: 0x6e930c514ad30f43a83b759a0f166310} 2025/09/12 06:17:35 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:35 client -> Sending packet 5 (39 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 118.462µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:35 client -> Sending packet 7 (46 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client -> Sending packet 8 (46 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:35 client <- Reading packet 6 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:35 client <- Reading packet 7 (28 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client newly acked packets (1): [8] 2025/09/12 06:17:35 client updated RTT: 32.554ms (σ: 9.834ms) 2025/09/12 06:17:35 client ECN capability confirmed. 2025/09/12 06:17:35 client Canceling loss detection timer. 2025/09/12 06:17:35 client -> Sending packet 9 (1366 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.PingFrame{} 2025/09/12 06:17:35 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:35 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:35 client <- Reading packet 9 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:35 client -> Sending packet 10 (39 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 71.184µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:35 client -> Sending packet 11 (30 bytes) for connection abc825c0b3925b8c083608b9548a142b19c2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3106a5305745f5c8, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:35 client Connection abc825c0b3925b8c083608b9548a142b19c2 closed. 2025/09/12 06:17:35 Requesting https://server4:443/amtdsoqvpj. 2025/09/12 06:17:35 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:35 Increased send buffer size to 14336 kiB 2025/09/12 06:17:35 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:35 Created qlog file: /logs/qlog/1398d5221e2a25a31580f4ba4d.sqlog 2025/09/12 06:17:35 client Starting new connection to server4 ([::]:39561 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1398d5221e2a25a31580f4ba4d, version v1 2025/09/12 06:17:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:35 client -> Sending packet 0 (1280 bytes) for connection 1398d5221e2a25a31580f4ba4d, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: 1398d5221e2a25a31580f4ba4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:35 client -> Sending packet 1 (1280 bytes) for connection 1398d5221e2a25a31580f4ba4d, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: 1398d5221e2a25a31580f4ba4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1235, Data length: 270, Offset + Data length: 1505} 2025/09/12 06:17:35 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2b1c53b2691b2d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:35 client Received first packet. Switching destination connection ID to: d2b1c53b2691b2d2 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112µs} 2025/09/12 06:17:35 client newly acked packets (1): [0] 2025/09/12 06:17:35 client updated RTT: 31.729074ms (σ: 15.864537ms) 2025/09/12 06:17:35 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:35 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d2b1c53b2691b2d2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 296µs} 2025/09/12 06:17:35 client newly acked packets (1): [1] 2025/09/12 06:17:35 client updated RTT: 31.988ms (σ: 12.417ms) 2025/09/12 06:17:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:35 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d2b1c53b2691b2d2, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1398d5221e2a25a31580f4ba4d, InitialSourceConnectionID: d2b1c53b2691b2d2, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x06b893ac845a936041f5a938986f1345, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1398d5221e2a25a31580f4ba4d 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: d2b1c53b2691b2d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: d2b1c53b2691b2d2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:35 client Dropping Initial keys. 2025/09/12 06:17:35 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3fd17f8c8724a222, StatelessResetToken: 0x7e21fc45080418e01211f6e22de71e23} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 837f484e273f1b53, StatelessResetToken: 0x9efc79b2fbbc1368ff19da5074fd757c} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0103b7731471b843, StatelessResetToken: 0xdc379c2abde7a850d84a9e8c1e06f8f3} 2025/09/12 06:17:35 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:35 client -> Sending packet 1 (91 bytes) for connection 1398d5221e2a25a31580f4ba4d, Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: 3fd17f8c8724a222, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3fd17f8c8724a222, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:35 client -> Sending packet 1 (36 bytes) for connection 1398d5221e2a25a31580f4ba4d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3fd17f8c8724a222, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 598.613µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4a7b9509a79b579a, StatelessResetToken: 0xf2b4817f057ad1faef3823f9b8a9de33} 2025/09/12 06:17:35 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:35 client -> Sending packet 2 (37 bytes) for connection 1398d5221e2a25a31580f4ba4d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3fd17f8c8724a222, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 71.334µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:35 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:35 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:35 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:35 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:35 client -> Sending packet 3 (39 bytes) for connection 1398d5221e2a25a31580f4ba4d, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3fd17f8c8724a222, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48.454µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:35 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:35 client -> Sending packet 2 (69 bytes) for connection 1398d5221e2a25a31580f4ba4d, Handshake 2025/09/12 06:17:35 client Long Header{Type: Handshake, DestConnectionID: 3fd17f8c8724a222, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:35 client Short Header{DestConnectionID: 3fd17f8c8724a222, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:35 client Connection 1398d5221e2a25a31580f4ba4d closed. 2025/09/12 06:17:35 Requesting https://server4:443/znpxcpcdxj. 2025/09/12 06:17:35 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:35 Increased send buffer size to 14336 kiB 2025/09/12 06:17:35 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:35 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:35 Created qlog file: /logs/qlog/ba5501ca42ab079f3daa2b5eb30037.sqlog 2025/09/12 06:17:35 client Starting new connection to server4 ([::]:40222 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ba5501ca42ab079f3daa2b5eb30037, version v1 2025/09/12 06:17:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:35 client -> Sending packet 0 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: ba5501ca42ab079f3daa2b5eb30037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:35 client -> Sending packet 1 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: ba5501ca42ab079f3daa2b5eb30037, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 06:17:35 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:35 client Received first packet. Switching destination connection ID to: 259b358c76641a2f 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104µs} 2025/09/12 06:17:35 client newly acked packets (1): [0] 2025/09/12 06:17:35 client updated RTT: 31.734451ms (σ: 15.867225ms) 2025/09/12 06:17:35 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:35 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:35 client -> Sending packet 2 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 06:17:35 client -> Sending packet 3 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 06:17:35 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:35 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:35 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs} 2025/09/12 06:17:35 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:36 client -> Sending packet 4 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:36 client -> Sending packet 5 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 1233, Data length: 284, Offset + Data length: 1517} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:36 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 56µs} 2025/09/12 06:17:36 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 06:17:36 client newly acked packets (1): [5] 2025/09/12 06:17:36 client updated RTT: 31.865ms (σ: 12.162ms) 2025/09/12 06:17:36 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client -> Sending packet 6 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:36 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:36 client -> Sending packet 7 (1280 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client <- Reading packet 2 (771 bytes) for connection (empty), Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, PacketNumber: 2, PacketNumberLen: 1, Length: 754, Version: v1} 2025/09/12 06:17:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 06:17:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ba5501ca42ab079f3daa2b5eb30037, InitialSourceConnectionID: 259b358c76641a2f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x3f63d5c5e565435a584937581440463d, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:36 client -> Sending packet 0 (82 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 259b358c76641a2f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:36 client Dropping Initial keys. 2025/09/12 06:17:36 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9bb2a0587d38d527, StatelessResetToken: 0x1658394bc2b0b34a7c5a6a44a80536b5} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fe18e82befd6d58, StatelessResetToken: 0x537b01eea24e38b46cd9634da3c4069d} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aeb8fc8601324307, StatelessResetToken: 0xf20f69663b0cfafdcffabad56d6d7218} 2025/09/12 06:17:36 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:36 client -> Sending packet 0 (59 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 9bb2a0587d38d527, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 334.240568ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:36 client -> Sending packet 1 (74 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 9bb2a0587d38d527, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:36 client -> Sending packet 2 (74 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 9bb2a0587d38d527, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:36 client <- Reading packet 3 (771 bytes) for connection (empty), Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 259b358c76641a2f, PacketNumber: 3, PacketNumberLen: 1, Length: 754, Version: v1} 2025/09/12 06:17:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 06:17:36 client -> Sending packet 3 (43 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 9bb2a0587d38d527, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 06:17:36 client -> Sending packet 4 (74 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 9bb2a0587d38d527, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:36 client -> Sending packet 5 (74 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 9bb2a0587d38d527, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:36 client <- Reading packet 2 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aeb8fc8601324307, StatelessResetToken: 0xf20f69663b0cfafdcffabad56d6d7218} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fe18e82befd6d58, StatelessResetToken: 0x537b01eea24e38b46cd9634da3c4069d} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9bb2a0587d38d527, StatelessResetToken: 0x1658394bc2b0b34a7c5a6a44a80536b5} 2025/09/12 06:17:36 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:36 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:36 client Dropping Handshake keys. 2025/09/12 06:17:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:36 client -> Sending packet 2 (58 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 9bb2a0587d38d527, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 150.943µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 client -> Sending packet 3 (48 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 9bb2a0587d38d527, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 8µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client newly acked packets (1): [3] 2025/09/12 06:17:36 client updated RTT: 31.723ms (σ: 9.403ms) 2025/09/12 06:17:36 client ECN capability confirmed. 2025/09/12 06:17:36 client Canceling loss detection timer. 2025/09/12 06:17:36 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6d44df11f731de6c, StatelessResetToken: 0xd51106f777c8a95f79367e3cd68d7d65} 2025/09/12 06:17:36 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:36 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:36 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:36 client <- Reading packet 8 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:36 client -> Sending packet 4 (39 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 9bb2a0587d38d527, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 122.698µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:36 client -> Sending packet 5 (30 bytes) for connection ba5501ca42ab079f3daa2b5eb30037, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 9bb2a0587d38d527, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:36 client Connection ba5501ca42ab079f3daa2b5eb30037 closed. 2025/09/12 06:17:36 Requesting https://server4:443/ecgfygrspi. 2025/09/12 06:17:36 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:36 Increased send buffer size to 14336 kiB 2025/09/12 06:17:36 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:36 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:36 Created qlog file: /logs/qlog/0471ea0abe632335dbf3d3970e421962a362e572.sqlog 2025/09/12 06:17:36 client Starting new connection to server4 ([::]:49670 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0471ea0abe632335dbf3d3970e421962a362e572, version v1 2025/09/12 06:17:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:36 client -> Sending packet 0 (1280 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 0471ea0abe632335dbf3d3970e421962a362e572, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:36 client -> Sending packet 1 (1280 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 0471ea0abe632335dbf3d3970e421962a362e572, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 1228, Data length: 283, Offset + Data length: 1511} 2025/09/12 06:17:36 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 512c188f7cdce620, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:36 client Received first packet. Switching destination connection ID to: 512c188f7cdce620 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144µs} 2025/09/12 06:17:36 client newly acked packets (1): [0] 2025/09/12 06:17:36 client updated RTT: 31.840002ms (σ: 15.920001ms) 2025/09/12 06:17:36 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:36 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 512c188f7cdce620, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 336µs} 2025/09/12 06:17:36 client newly acked packets (1): [1] 2025/09/12 06:17:36 client updated RTT: 32.091ms (σ: 12.442ms) 2025/09/12 06:17:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:36 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 512c188f7cdce620, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 06:17:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0471ea0abe632335dbf3d3970e421962a362e572, InitialSourceConnectionID: 512c188f7cdce620, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x947bc3c9d604f774bfaa7af07bec7a1b, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:36 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 077ec55ee2a3488d, StatelessResetToken: 0xad2a1f36633feb97200b8e379512120c} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6e28e2480566fc13, StatelessResetToken: 0x3e6249f7a958e6e915798ead041a4281} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08af54fb52d6da18, StatelessResetToken: 0x7f97e5b1e9539092fb17121497088ca9} 2025/09/12 06:17:36 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 077ec55ee2a3488d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 077ec55ee2a3488d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:36 client Dropping Initial keys. 2025/09/12 06:17:36 client -> Sending packet 1 (89 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, Handshake 2025/09/12 06:17:36 client Long Header{Type: Handshake, DestConnectionID: 077ec55ee2a3488d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 client -> Sending packet 2 (36 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 685.737µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:36 client Dropping Handshake keys. 2025/09/12 06:17:36 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:36 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 060a9db914cd3331, StatelessResetToken: 0xb3771f6ddd69223ccba9466d03ea6e9c} 2025/09/12 06:17:36 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:36 client -> Sending packet 3 (35 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 190.184µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client <- Reading packet 3 (29 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.256ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client newly acked packets (1): [0] 2025/09/12 06:17:36 client lost packet 1 (time threshold) 2025/09/12 06:17:36 client Canceling loss detection timer. 2025/09/12 06:17:36 client -> Sending packet 4 (46 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:36 client -> Sending packet 6 (46 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 client -> Sending packet 7 (46 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:36 client <- Reading packet 4 (30 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client newly acked packets (1): [7] 2025/09/12 06:17:36 client updated RTT: 31.93ms (σ: 9.652ms) 2025/09/12 06:17:36 client ECN capability confirmed. 2025/09/12 06:17:36 client Canceling loss detection timer. 2025/09/12 06:17:36 client -> Sending packet 8 (1366 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.PingFrame{} 2025/09/12 06:17:36 client <- Reading packet 5 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:36 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:36 client <- Reading packet 6 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:36 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:36 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:36 client -> Sending packet 9 (35 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 28.281µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:36 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:36 client -> Sending packet 10 (30 bytes) for connection 0471ea0abe632335dbf3d3970e421962a362e572, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:36 client Short Header{DestConnectionID: 077ec55ee2a3488d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:36 client Connection 0471ea0abe632335dbf3d3970e421962a362e572 closed. 2025/09/12 06:17:36 Requesting https://server4:443/afrhswqvup. 2025/09/12 06:17:36 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:36 Increased send buffer size to 14336 kiB 2025/09/12 06:17:36 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:36 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:36 Created qlog file: /logs/qlog/529049344bf25e59e6e96359.sqlog 2025/09/12 06:17:36 client Starting new connection to server4 ([::]:58487 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 529049344bf25e59e6e96359, version v1 2025/09/12 06:17:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:36 client -> Sending packet 0 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 529049344bf25e59e6e96359, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 06:17:36 client -> Sending packet 1 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 529049344bf25e59e6e96359, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 06:17:36 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:36 client Received first packet. Switching destination connection ID to: 3c562ece41e78b80 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112µs} 2025/09/12 06:17:36 client newly acked packets (1): [0] 2025/09/12 06:17:36 client updated RTT: 31.789755ms (σ: 15.894877ms) 2025/09/12 06:17:36 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:36 client -> Sending packet 2 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 3c562ece41e78b80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:36 client -> Sending packet 3 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: 3c562ece41e78b80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 1236, Data length: 268, Offset + Data length: 1504} 2025/09/12 06:17:36 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:36 client <- Reading packet 2 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:36 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs} 2025/09/12 06:17:36 client newly acked packets (1): [3] 2025/09/12 06:17:36 client updated RTT: 31.925ms (σ: 12.193ms) 2025/09/12 06:17:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:37 client -> Sending packet 4 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:37 client Long Header{Type: Initial, DestConnectionID: 3c562ece41e78b80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:37 client -> &wire.PingFrame{} 2025/09/12 06:17:37 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:37 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 64µs} 2025/09/12 06:17:37 client newly acked packets (1): [4] 2025/09/12 06:17:37 client updated RTT: 31.899ms (σ: 9.194ms) 2025/09/12 06:17:37 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:37 client -> Sending packet 5 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:37 client Long Header{Type: Initial, DestConnectionID: 3c562ece41e78b80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:37 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:37 client -> Sending packet 6 (1280 bytes) for connection 529049344bf25e59e6e96359, Initial 2025/09/12 06:17:37 client Long Header{Type: Initial, DestConnectionID: 3c562ece41e78b80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client <- Reading packet 1 (768 bytes) for connection (empty), Handshake 2025/09/12 06:17:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, PacketNumber: 1, PacketNumberLen: 1, Length: 751, Version: v1} 2025/09/12 06:17:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 06:17:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 529049344bf25e59e6e96359, InitialSourceConnectionID: 3c562ece41e78b80, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x2f8e80653972ad3f2d26d1bc9ce10ac1, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:37 client -> Sending packet 0 (82 bytes) for connection 529049344bf25e59e6e96359, Handshake 2025/09/12 06:17:37 client Long Header{Type: Handshake, DestConnectionID: 3c562ece41e78b80, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:37 client Dropping Initial keys. 2025/09/12 06:17:37 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8cc91a2508451fd8, StatelessResetToken: 0xa107bafe94993efcd7bc094291339fb9} 2025/09/12 06:17:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be2b2f82852baedb, StatelessResetToken: 0x2dc44ca9143d8b3378c405eb0a5b5649} 2025/09/12 06:17:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e245832cbcd2981c, StatelessResetToken: 0x6a541650102e5ffa35b5cb9bd9477f50} 2025/09/12 06:17:37 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:37 client -> Sending packet 0 (59 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 333.791076ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:37 client <- Reading packet 2 (768 bytes) for connection (empty), Handshake 2025/09/12 06:17:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3c562ece41e78b80, PacketNumber: 2, PacketNumberLen: 1, Length: 751, Version: v1} 2025/09/12 06:17:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 730, Offset + Data length: 730} 2025/09/12 06:17:37 client -> Sending packet 1 (43 bytes) for connection 529049344bf25e59e6e96359, Handshake 2025/09/12 06:17:37 client Long Header{Type: Handshake, DestConnectionID: 8cc91a2508451fd8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:37 client Dropping Handshake keys. 2025/09/12 06:17:37 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:37 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:37 client -> Sending packet 1 (36 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.243542ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:37 client -> Sending packet 3 (48 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:37 client -> Sending packet 4 (48 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:37 client <- Reading packet 2 (28 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client newly acked packets (1): [4] 2025/09/12 06:17:37 client updated RTT: 31.77ms (σ: 7.151ms) 2025/09/12 06:17:37 client ECN capability confirmed. 2025/09/12 06:17:37 client Canceling loss detection timer. 2025/09/12 06:17:37 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5177b085b7c2edda, StatelessResetToken: 0xe5765d4f4b015fe2b4356fcfc5bab958} 2025/09/12 06:17:37 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:37 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:37 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:37 client -> Sending packet 5 (35 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 72.266µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client <- Reading packet 6 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.PingFrame{} 2025/09/12 06:17:37 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:37 client <- Reading packet 7 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.PingFrame{} 2025/09/12 06:17:37 client -> Sending packet 6 (1366 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.PingFrame{} 2025/09/12 06:17:37 client -> Sending packet 7 (37 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 153.398µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:37 client <- Reading packet 9 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.PingFrame{} 2025/09/12 06:17:37 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:37 client <- Reading packet 10 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:37 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:37 client <- &wire.PingFrame{} 2025/09/12 06:17:37 client -> Sending packet 8 (39 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:37 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:37 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 103.434µs, ECT0: 9, ECT1: 0, CE: 0} 2025/09/12 06:17:38 client <- Reading packet 13 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:38 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:38 client <- &wire.PingFrame{} 2025/09/12 06:17:38 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:38 client -> Sending packet 9 (41 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:38 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:38 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 107.422µs, ECT0: 10, ECT1: 0, CE: 0} 2025/09/12 06:17:40 client <- Reading packet 15 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.PingFrame{} 2025/09/12 06:17:40 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:40 client <- Reading packet 16 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.PingFrame{} 2025/09/12 06:17:40 client -> Sending packet 10 (43 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:40 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 0, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 123.362µs, ECT0: 12, ECT1: 0, CE: 0} 2025/09/12 06:17:40 client <- Reading packet 17 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:40 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:40 client -> Sending packet 11 (30 bytes) for connection 529049344bf25e59e6e96359, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:40 client Short Header{DestConnectionID: 8cc91a2508451fd8, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:40 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:40 client Connection 529049344bf25e59e6e96359 closed. 2025/09/12 06:17:40 Requesting https://server4:443/udzrvfkdbr. 2025/09/12 06:17:40 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:40 Increased send buffer size to 14336 kiB 2025/09/12 06:17:40 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:40 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:40 Created qlog file: /logs/qlog/0ced17344aaa508f2c0d1539.sqlog 2025/09/12 06:17:40 client Starting new connection to server4 ([::]:35917 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0ced17344aaa508f2c0d1539, version v1 2025/09/12 06:17:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:40 client -> Sending packet 0 (1280 bytes) for connection 0ced17344aaa508f2c0d1539, Initial 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: 0ced17344aaa508f2c0d1539, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 06:17:40 client -> Sending packet 1 (1280 bytes) for connection 0ced17344aaa508f2c0d1539, Initial 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: 0ced17344aaa508f2c0d1539, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:40 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4dbf03f7cbbdc364, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:40 client Received first packet. Switching destination connection ID to: 4dbf03f7cbbdc364 2025/09/12 06:17:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/09/12 06:17:40 client newly acked packets (1): [0] 2025/09/12 06:17:40 client updated RTT: 31.990199ms (σ: 15.995099ms) 2025/09/12 06:17:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:40 client -> Sending packet 2 (1280 bytes) for connection 0ced17344aaa508f2c0d1539, Initial 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: 4dbf03f7cbbdc364, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 06:17:40 client -> Sending packet 3 (1280 bytes) for connection 0ced17344aaa508f2c0d1539, Initial 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: 4dbf03f7cbbdc364, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 1236, Data length: 271, Offset + Data length: 1507} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:40 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:40 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4dbf03f7cbbdc364, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 360µs} 2025/09/12 06:17:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:40 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:40 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4dbf03f7cbbdc364, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:40 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:40 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0ced17344aaa508f2c0d1539, InitialSourceConnectionID: 4dbf03f7cbbdc364, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x7f32c68d496506c2fbdda579e54087ca, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:40 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 226896ad1bbc0344, StatelessResetToken: 0x73ce7f3169d88d661788d52a27ee87ca} 2025/09/12 06:17:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 547d9facdf47c38e, StatelessResetToken: 0xf86f411c85904ce3d45e0acd13e21c05} 2025/09/12 06:17:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb5fa945ed2920d8, StatelessResetToken: 0xe1e495fb76645160e08baa36a94f6d2c} 2025/09/12 06:17:40 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:40 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0ced17344aaa508f2c0d1539 2025/09/12 06:17:40 client Long Header{Type: Initial, DestConnectionID: 226896ad1bbc0344, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:40 client Long Header{Type: Handshake, DestConnectionID: 226896ad1bbc0344, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:40 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:40 client Dropping Initial keys. 2025/09/12 06:17:40 client -> Sending packet 1 (89 bytes) for connection 0ced17344aaa508f2c0d1539, Handshake 2025/09/12 06:17:40 client Long Header{Type: Handshake, DestConnectionID: 226896ad1bbc0344, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:40 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:40 client -> Sending packet 2 (36 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:40 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 855.978µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:40 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:40 client Dropping Handshake keys. 2025/09/12 06:17:40 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:40 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0dcec2b6e303dbed, StatelessResetToken: 0x70fbedadcf5317f1525e6b463cf04a95} 2025/09/12 06:17:40 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:40 client -> Sending packet 3 (35 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:40 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 123.212µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:40 client <- Reading packet 3 (29 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:40 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:40 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.336ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:40 client newly acked packets (1): [0] 2025/09/12 06:17:40 client lost packet 1 (time threshold) 2025/09/12 06:17:40 client Canceling loss detection timer. 2025/09/12 06:17:40 client -> Sending packet 4 (46 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:40 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:40 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:41 client <- Reading packet 4 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:41 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:41 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0dcec2b6e303dbed, StatelessResetToken: 0x70fbedadcf5317f1525e6b463cf04a95} 2025/09/12 06:17:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:41 client -> Sending packet 5 (35 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 116.438µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:41 client -> Sending packet 7 (46 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:41 client -> Sending packet 8 (46 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:41 client <- Reading packet 6 (28 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client -> Sending packet 9 (1366 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.PingFrame{} 2025/09/12 06:17:41 client <- Reading packet 8 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:41 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:41 client -> Sending packet 10 (37 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 0}}, DelayTime: 68.478µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client <- Reading packet 9 (29 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 26.416ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client newly acked packets (1): [8] 2025/09/12 06:17:41 client updated RTT: 32.001ms (σ: 12.019ms) 2025/09/12 06:17:41 client ECN capability confirmed. 2025/09/12 06:17:41 client Canceling loss detection timer. 2025/09/12 06:17:41 client <- Reading packet 10 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:41 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:41 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:41 client -> Sending packet 11 (30 bytes) for connection 0ced17344aaa508f2c0d1539, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 226896ad1bbc0344, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:41 client Connection 0ced17344aaa508f2c0d1539 closed. 2025/09/12 06:17:41 Requesting https://server4:443/vjbgvjwhpn. 2025/09/12 06:17:41 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:41 Increased send buffer size to 14336 kiB 2025/09/12 06:17:41 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:41 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:41 Created qlog file: /logs/qlog/1966bcf338ff14b50dd5aa207f9b6e0bb33caa.sqlog 2025/09/12 06:17:41 client Starting new connection to server4 ([::]:58849 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, version v1 2025/09/12 06:17:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:41 client -> Sending packet 0 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:41 client -> Sending packet 1 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:41 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8a8a390bf435d5a1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:41 client Received first packet. Switching destination connection ID to: 8a8a390bf435d5a1 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120µs} 2025/09/12 06:17:41 client newly acked packets (1): [1] 2025/09/12 06:17:41 client updated RTT: 32.784613ms (σ: 16.392306ms) 2025/09/12 06:17:41 client setting loss timer for packet 0 (Initial) to 36.882689ms (in 2025-09-12 06:17:41.159690846 +0000 UTC m=+20.666800642) 2025/09/12 06:17:41 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:41.159690846 +0000 UTC m=+20.666800642 2025/09/12 06:17:41 client lost packet 0 (time threshold) 2025/09/12 06:17:41 client -> Sending packet 2 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:41 client -> Sending packet 3 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:41 client -> Sending packet 4 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:41 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8a8a390bf435d5a1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 48µs} 2025/09/12 06:17:41 client <- Reading packet 3 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8a8a390bf435d5a1, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 16µs} 2025/09/12 06:17:41 client newly acked packets (1): [4] 2025/09/12 06:17:41 client updated RTT: 32.771ms (σ: 12.318ms) 2025/09/12 06:17:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:41 client -> Sending packet 5 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.PingFrame{} 2025/09/12 06:17:41 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8a8a390bf435d5a1, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client -> Sending packet 6 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 06:17:41 client -> Sending packet 7 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.PingFrame{} 2025/09/12 06:17:41 client -> Sending packet 8 (1280 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.PingFrame{} 2025/09/12 06:17:41 client <- Reading packet 2 (775 bytes) for connection (empty), Handshake 2025/09/12 06:17:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8a8a390bf435d5a1, PacketNumber: 2, PacketNumberLen: 1, Length: 758, Version: v1} 2025/09/12 06:17:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 737, Offset + Data length: 737} 2025/09/12 06:17:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, InitialSourceConnectionID: 8a8a390bf435d5a1, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xfa13d699907f3d1a8fb55a536570cb30, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:41 client -> Sending packet 0 (82 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, Handshake 2025/09/12 06:17:41 client Long Header{Type: Handshake, DestConnectionID: 8a8a390bf435d5a1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:41 client Dropping Initial keys. 2025/09/12 06:17:41 client -> Sending packet 0 (46 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 8a8a390bf435d5a1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:41 client Dropping %!s(logging.PacketType=0) packet (42 bytes) because we already dropped the keys. 2025/09/12 06:17:41 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:41 client Dropping Handshake keys. 2025/09/12 06:17:41 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:41 client -> Sending packet 1 (35 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 8a8a390bf435d5a1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 82.155µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:41 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:41 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:41 client -> Sending packet 2 (35 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 8a8a390bf435d5a1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 54.629µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:41 client -> Sending packet 3 (30 bytes) for connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: 8a8a390bf435d5a1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:41 client Connection 1966bcf338ff14b50dd5aa207f9b6e0bb33caa closed. 2025/09/12 06:17:41 Requesting https://server4:443/uqzwesvwwf. 2025/09/12 06:17:41 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:41 Increased send buffer size to 14336 kiB 2025/09/12 06:17:41 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:41 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:41 Created qlog file: /logs/qlog/43ac59172d69620ea6.sqlog 2025/09/12 06:17:41 client Starting new connection to server4 ([::]:43844 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 43ac59172d69620ea6, version v1 2025/09/12 06:17:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:41 client -> Sending packet 0 (1280 bytes) for connection 43ac59172d69620ea6, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 43ac59172d69620ea6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:41 client -> Sending packet 1 (1280 bytes) for connection 43ac59172d69620ea6, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 43ac59172d69620ea6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 1239, Data length: 279, Offset + Data length: 1518} 2025/09/12 06:17:41 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:41 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca533cb035cbe682, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:41 client Received first packet. Switching destination connection ID to: ca533cb035cbe682 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 328µs} 2025/09/12 06:17:41 client newly acked packets (2): [0 1] 2025/09/12 06:17:41 client updated RTT: 33.827994ms (σ: 16.913997ms) 2025/09/12 06:17:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:41 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ca533cb035cbe682, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 43ac59172d69620ea6, InitialSourceConnectionID: ca533cb035cbe682, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xd8c5788612906ca0655f37e6e396a27f, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 43ac59172d69620ea6 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: ca533cb035cbe682, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client Long Header{Type: Handshake, DestConnectionID: ca533cb035cbe682, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:41 client Dropping Initial keys. 2025/09/12 06:17:41 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e40512a2dd5d2b85, StatelessResetToken: 0x304438ede1405af56cfd2802ba52ea1e} 2025/09/12 06:17:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6198e715a13c4752, StatelessResetToken: 0x152ba4ecd1c6869f7bcabb4f0c73551e} 2025/09/12 06:17:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e10c43c9c6ec698b, StatelessResetToken: 0x77adbeb1a0819e02287469d7a6ecb51d} 2025/09/12 06:17:41 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:41 client -> Sending packet 1 (91 bytes) for connection 43ac59172d69620ea6, Handshake 2025/09/12 06:17:41 client Long Header{Type: Handshake, DestConnectionID: e40512a2dd5d2b85, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client Short Header{DestConnectionID: e40512a2dd5d2b85, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:41 client -> Sending packet 1 (36 bytes) for connection 43ac59172d69620ea6, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: e40512a2dd5d2b85, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 645.896µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:41 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:41 client -> Sending packet 2 (37 bytes) for connection 43ac59172d69620ea6, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:41 client Short Header{DestConnectionID: e40512a2dd5d2b85, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 77.706µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:41 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:41 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:41 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:41 client -> Sending packet 2 (69 bytes) for connection 43ac59172d69620ea6, Handshake 2025/09/12 06:17:41 client Long Header{Type: Handshake, DestConnectionID: e40512a2dd5d2b85, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:41 client Short Header{DestConnectionID: e40512a2dd5d2b85, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:41 client Connection 43ac59172d69620ea6 closed. 2025/09/12 06:17:41 Requesting https://server4:443/botrvwxeht. 2025/09/12 06:17:41 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:41 Increased send buffer size to 14336 kiB 2025/09/12 06:17:41 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:41 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:41 Created qlog file: /logs/qlog/7fcfb799fa905a566a5f87c4efa81a8e.sqlog 2025/09/12 06:17:41 client Starting new connection to server4 ([::]:57354 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7fcfb799fa905a566a5f87c4efa81a8e, version v1 2025/09/12 06:17:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:41 client -> Sending packet 0 (1280 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 7fcfb799fa905a566a5f87c4efa81a8e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 06:17:41 client -> Sending packet 1 (1280 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: 7fcfb799fa905a566a5f87c4efa81a8e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:41 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7479df40b88df38, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:41 client Received first packet. Switching destination connection ID to: a7479df40b88df38 2025/09/12 06:17:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:41 client newly acked packets (1): [0] 2025/09/12 06:17:41 client updated RTT: 31.70951ms (σ: 15.854755ms) 2025/09/12 06:17:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:41 client -> Sending packet 2 (1280 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/09/12 06:17:41 client -> Sending packet 3 (1280 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Initial 2025/09/12 06:17:41 client Long Header{Type: Initial, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/09/12 06:17:41 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:42 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7479df40b88df38, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 376µs} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:42 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a7479df40b88df38, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 733, Offset + Data length: 733} 2025/09/12 06:17:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7fcfb799fa905a566a5f87c4efa81a8e, InitialSourceConnectionID: a7479df40b88df38, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x9be307cfe3d63ce038ef53d73256cb34, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:42 client Dropping Initial keys. 2025/09/12 06:17:42 client -> Sending packet 1 (89 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Short Header{DestConnectionID: a7479df40b88df38, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:42 client -> Sending packet 2 (74 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:42 client -> Sending packet 3 (74 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: a7479df40b88df38, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:42 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:42 client Dropping Handshake keys. 2025/09/12 06:17:42 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:42 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:42 client -> Sending packet 2 (54 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: a7479df40b88df38, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 113.424µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:42 client -> Sending packet 3 (46 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: a7479df40b88df38, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:42 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:42 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:42 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:42 client -> Sending packet 4 (37 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: a7479df40b88df38, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 77.395µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:42 client -> Sending packet 5 (30 bytes) for connection 7fcfb799fa905a566a5f87c4efa81a8e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: a7479df40b88df38, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:42 client Connection 7fcfb799fa905a566a5f87c4efa81a8e closed. 2025/09/12 06:17:42 Requesting https://server4:443/nseetotekk. 2025/09/12 06:17:42 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:42 Increased send buffer size to 14336 kiB 2025/09/12 06:17:42 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:42 Created qlog file: /logs/qlog/97d4f808676da4e9e14ee5b0.sqlog 2025/09/12 06:17:42 client Starting new connection to server4 ([::]:44569 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 97d4f808676da4e9e14ee5b0, version v1 2025/09/12 06:17:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:42 client -> Sending packet 0 (1280 bytes) for connection 97d4f808676da4e9e14ee5b0, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 97d4f808676da4e9e14ee5b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:42 client -> Sending packet 1 (1280 bytes) for connection 97d4f808676da4e9e14ee5b0, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 97d4f808676da4e9e14ee5b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1236, Data length: 281, Offset + Data length: 1517} 2025/09/12 06:17:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:42 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b57513e4557d886, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:42 client Received first packet. Switching destination connection ID to: 4b57513e4557d886 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:42 client newly acked packets (1): [0] 2025/09/12 06:17:42 client updated RTT: 31.709652ms (σ: 15.854826ms) 2025/09/12 06:17:42 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:42 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b57513e4557d886, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 320µs} 2025/09/12 06:17:42 client newly acked packets (1): [1] 2025/09/12 06:17:42 client updated RTT: 31.973ms (σ: 12.418ms) 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:42 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b57513e4557d886, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 97d4f808676da4e9e14ee5b0, InitialSourceConnectionID: 4b57513e4557d886, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x8016be66a9096a9140b225438c945700, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:42 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8c0708043afb05d, StatelessResetToken: 0xd2b8258596d16abeea88c604ceceb5c1} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d7df945c8ecee93, StatelessResetToken: 0xbcaa53de6858137c73220e92edb4c0f1} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6d1e0f88a6201e02, StatelessResetToken: 0xc6285729cf74e9bfc0755e51bc820188} 2025/09/12 06:17:42 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 97d4f808676da4e9e14ee5b0 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: c8c0708043afb05d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: c8c0708043afb05d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:42 client Short Header{DestConnectionID: c8c0708043afb05d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:42 client Dropping Initial keys. 2025/09/12 06:17:42 client -> Sending packet 1 (89 bytes) for connection 97d4f808676da4e9e14ee5b0, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: c8c0708043afb05d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Short Header{DestConnectionID: c8c0708043afb05d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:42 client -> Sending packet 2 (36 bytes) for connection 97d4f808676da4e9e14ee5b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: c8c0708043afb05d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 815.37µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client <- Reading packet 1 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:42 client Dropping Handshake keys. 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client newly acked packets (2): [0 1] 2025/09/12 06:17:42 client Canceling loss detection timer. 2025/09/12 06:17:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:42 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2a2bc345d916e1a3, StatelessResetToken: 0x87dfd03c07fa9b6ffbd8f7181d536af9} 2025/09/12 06:17:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:42 client -> Sending packet 3 (35 bytes) for connection 97d4f808676da4e9e14ee5b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: c8c0708043afb05d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 145.874µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:42 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:42 client -> Sending packet 4 (35 bytes) for connection 97d4f808676da4e9e14ee5b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: c8c0708043afb05d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 59.537µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:42 client -> Sending packet 5 (30 bytes) for connection 97d4f808676da4e9e14ee5b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: c8c0708043afb05d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:42 client Connection 97d4f808676da4e9e14ee5b0 closed. 2025/09/12 06:17:42 Requesting https://server4:443/zsbambpfre. 2025/09/12 06:17:42 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:42 Increased send buffer size to 14336 kiB 2025/09/12 06:17:42 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:42 Created qlog file: /logs/qlog/6a65f6032c47e07e83eeea7a418e86d44d7fc9.sqlog 2025/09/12 06:17:42 client Starting new connection to server4 ([::]:35128 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a65f6032c47e07e83eeea7a418e86d44d7fc9, version v1 2025/09/12 06:17:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:42 client -> Sending packet 0 (1280 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 6a65f6032c47e07e83eeea7a418e86d44d7fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:42 client -> Sending packet 1 (1280 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 6a65f6032c47e07e83eeea7a418e86d44d7fc9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1229, Data length: 278, Offset + Data length: 1507} 2025/09/12 06:17:42 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 420feae161fc7b86, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:42 client Received first packet. Switching destination connection ID to: 420feae161fc7b86 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:42 client newly acked packets (1): [0] 2025/09/12 06:17:42 client updated RTT: 31.694596ms (σ: 15.847298ms) 2025/09/12 06:17:42 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:42 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 420feae161fc7b86, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 320µs} 2025/09/12 06:17:42 client newly acked packets (1): [1] 2025/09/12 06:17:42 client updated RTT: 31.958ms (σ: 12.415ms) 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:42 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 420feae161fc7b86, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 738, Offset + Data length: 738} 2025/09/12 06:17:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a65f6032c47e07e83eeea7a418e86d44d7fc9, InitialSourceConnectionID: 420feae161fc7b86, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x7205b3d92f85404bd9225b8358b11b12, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:42 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 420feae161fc7b86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: 420feae161fc7b86, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:42 client Dropping Initial keys. 2025/09/12 06:17:42 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9915ee36a163db6c, StatelessResetToken: 0xf1371de429b28cc573b3be4ea4c673de} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ed674c1a338ce545, StatelessResetToken: 0x14bafdb0919025b2c9e49fb9076d1966} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a87463ffc64556b, StatelessResetToken: 0x352bcb4cc5a3c0b8a4bd6562e002c518} 2025/09/12 06:17:42 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:42 client -> Sending packet 1 (91 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: 9915ee36a163db6c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Short Header{DestConnectionID: 9915ee36a163db6c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:42 client -> Sending packet 1 (36 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: 9915ee36a163db6c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 603.481µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:42 client Dropping Handshake keys. 2025/09/12 06:17:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:42 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:42 client -> Sending packet 2 (37 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: 9915ee36a163db6c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 58.86µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:42 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:42 client -> Sending packet 3 (30 bytes) for connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: 9915ee36a163db6c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:42 client Connection 6a65f6032c47e07e83eeea7a418e86d44d7fc9 closed. 2025/09/12 06:17:42 Requesting https://server4:443/armnnxficl. 2025/09/12 06:17:42 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:42 Increased send buffer size to 14336 kiB 2025/09/12 06:17:42 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:42 Created qlog file: /logs/qlog/284aea92d90e2583f27cc67cc19efea7a775.sqlog 2025/09/12 06:17:42 client Starting new connection to server4 ([::]:46501 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 284aea92d90e2583f27cc67cc19efea7a775, version v1 2025/09/12 06:17:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:42 client -> Sending packet 0 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 284aea92d90e2583f27cc67cc19efea7a775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:42 client -> Sending packet 1 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 284aea92d90e2583f27cc67cc19efea7a775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1230, Data length: 274, Offset + Data length: 1504} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:42 client -> Sending packet 2 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 284aea92d90e2583f27cc67cc19efea7a775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 06:17:42 client -> Sending packet 3 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: 284aea92d90e2583f27cc67cc19efea7a775, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1230, Data length: 274, Offset + Data length: 1504} 2025/09/12 06:17:42 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a157ae1222443bba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:42 client Received first packet. Switching destination connection ID to: a157ae1222443bba 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112µs} 2025/09/12 06:17:42 client newly acked packets (1): [2] 2025/09/12 06:17:42 client updated RTT: 31.904577ms (σ: 15.952288ms) 2025/09/12 06:17:42 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:42 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:42 client -> Sending packet 4 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: a157ae1222443bba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1230, Data length: 274, Offset + Data length: 1504} 2025/09/12 06:17:42 client -> Sending packet 5 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: a157ae1222443bba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1230, Data length: 274, Offset + Data length: 1504} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client <- Reading packet 3 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a157ae1222443bba, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 32µs} 2025/09/12 06:17:42 client newly acked packets (1): [5] 2025/09/12 06:17:42 client updated RTT: 32.014ms (σ: 12.184ms) 2025/09/12 06:17:42 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a157ae1222443bba, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:42 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client -> Sending packet 6 (1280 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: a157ae1222443bba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:42 client <- Reading packet 1 (774 bytes) for connection (empty), Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a157ae1222443bba, PacketNumber: 1, PacketNumberLen: 1, Length: 757, Version: v1} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 06:17:42 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:42 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 284aea92d90e2583f27cc67cc19efea7a775, InitialSourceConnectionID: a157ae1222443bba, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x065f361b5a00f496b5a9ad1cc78642b5, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:42 client -> Sending packet 0 (82 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: a157ae1222443bba, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:42 client Dropping Initial keys. 2025/09/12 06:17:42 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 240fbd4d0a1fd0dc, StatelessResetToken: 0x6953d6855ca33dc613a800b7155f62fb} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97dfdc070d5f42c1, StatelessResetToken: 0x03a70b8ff37461f270b423150fb9c894} 2025/09/12 06:17:42 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e6301eb3c78abf9b, StatelessResetToken: 0x10f2f9f1f17635ce2dc8258ae47a192d} 2025/09/12 06:17:42 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:42 client -> Sending packet 0 (59 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: 240fbd4d0a1fd0dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 340.63729ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:42 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:42 client <- Reading packet 2 (774 bytes) for connection (empty), Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a157ae1222443bba, PacketNumber: 2, PacketNumberLen: 1, Length: 757, Version: v1} 2025/09/12 06:17:42 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 06:17:42 client -> Sending packet 1 (43 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, Handshake 2025/09/12 06:17:42 client Long Header{Type: Handshake, DestConnectionID: 240fbd4d0a1fd0dc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:42 client Dropping Handshake keys. 2025/09/12 06:17:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:42 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:42 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:42 client -> Sending packet 1 (37 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: 240fbd4d0a1fd0dc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 45.265µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:42 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:42 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:42 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:42 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:42 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:42 client -> Sending packet 2 (30 bytes) for connection 284aea92d90e2583f27cc67cc19efea7a775, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:42 client Short Header{DestConnectionID: 240fbd4d0a1fd0dc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:42 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:42 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:42 client Connection 284aea92d90e2583f27cc67cc19efea7a775 closed. 2025/09/12 06:17:42 Requesting https://server4:443/euhknegcpr. 2025/09/12 06:17:42 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:42 Increased send buffer size to 14336 kiB 2025/09/12 06:17:42 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:42 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:42 Created qlog file: /logs/qlog/aec787bcffe01253f1.sqlog 2025/09/12 06:17:42 client Starting new connection to server4 ([::]:33788 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aec787bcffe01253f1, version v1 2025/09/12 06:17:42 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:42 client -> Sending packet 0 (1280 bytes) for connection aec787bcffe01253f1, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: aec787bcffe01253f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:42 client -> Sending packet 1 (1280 bytes) for connection aec787bcffe01253f1, Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: aec787bcffe01253f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 1239, Data length: 269, Offset + Data length: 1508} 2025/09/12 06:17:42 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:42 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:42 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aee8f72b2f530658, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:42 client Received first packet. Switching destination connection ID to: aee8f72b2f530658 2025/09/12 06:17:42 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/09/12 06:17:42 client newly acked packets (1): [0] 2025/09/12 06:17:42 client updated RTT: 31.67007ms (σ: 15.835035ms) 2025/09/12 06:17:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 2 (1280 bytes) for connection aec787bcffe01253f1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: aee8f72b2f530658, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1239, Data length: 269, Offset + Data length: 1508} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client -> Sending packet 3 (1280 bytes) for connection aec787bcffe01253f1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: aee8f72b2f530658, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1239, Data length: 269, Offset + Data length: 1508} 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:43 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aee8f72b2f530658, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 416µs} 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:43 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aee8f72b2f530658, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/09/12 06:17:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aec787bcffe01253f1, InitialSourceConnectionID: aee8f72b2f530658, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x41307f4e2ce5240bc9f4123c141ac8e6, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aec787bcffe01253f1 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: aee8f72b2f530658, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: aee8f72b2f530658, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 client Dropping Initial keys. 2025/09/12 06:17:43 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a3b0c6577e491bf9, StatelessResetToken: 0x9d02d47b3063f6cec681146ebe145f0a} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c63368df690ff4b1, StatelessResetToken: 0xde3ad9be6fa270e39981d360fb41d8d4} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: af1de8f9597e5748, StatelessResetToken: 0x819e83a0296fab02f2413b18bd533c1b} 2025/09/12 06:17:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:43 client Dropping %!s(logging.PacketType=0) packet (42 bytes) because we already dropped the keys. 2025/09/12 06:17:43 client -> Sending packet 1 (91 bytes) for connection aec787bcffe01253f1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: a3b0c6577e491bf9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Short Header{DestConnectionID: a3b0c6577e491bf9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client -> Sending packet 1 (36 bytes) for connection aec787bcffe01253f1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: a3b0c6577e491bf9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 855.098µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 2 (74 bytes) for connection aec787bcffe01253f1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: a3b0c6577e491bf9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 client -> Sending packet 3 (74 bytes) for connection aec787bcffe01253f1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: a3b0c6577e491bf9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:43 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:43 client Dropping Handshake keys. 2025/09/12 06:17:43 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 3 (56 bytes) for connection aec787bcffe01253f1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: a3b0c6577e491bf9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 89.749µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client -> Sending packet 4 (48 bytes) for connection aec787bcffe01253f1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: a3b0c6577e491bf9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4b745ac366b1cb45, StatelessResetToken: 0x68a36613f0db8e1f6cea0344e2bece87} 2025/09/12 06:17:43 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:43 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:43 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:43 client -> Sending packet 5 (35 bytes) for connection aec787bcffe01253f1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: a3b0c6577e491bf9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 83.566µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:43 client -> Sending packet 6 (30 bytes) for connection aec787bcffe01253f1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: a3b0c6577e491bf9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:43 client Connection aec787bcffe01253f1 closed. 2025/09/12 06:17:43 Requesting https://server4:443/qsjxxvuzdw. 2025/09/12 06:17:43 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:43 Increased send buffer size to 14336 kiB 2025/09/12 06:17:43 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:43 Created qlog file: /logs/qlog/e586a4fc9dc34cc1.sqlog 2025/09/12 06:17:43 client Starting new connection to server4 ([::]:46849 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e586a4fc9dc34cc1, version v1 2025/09/12 06:17:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:43 client -> Sending packet 0 (1280 bytes) for connection e586a4fc9dc34cc1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: e586a4fc9dc34cc1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:43 client -> Sending packet 1 (1280 bytes) for connection e586a4fc9dc34cc1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: e586a4fc9dc34cc1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1240, Data length: 268, Offset + Data length: 1508} 2025/09/12 06:17:43 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4b3c37233074919, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:43 client Received first packet. Switching destination connection ID to: b4b3c37233074919 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:43 client newly acked packets (1): [0] 2025/09/12 06:17:43 client updated RTT: 31.72651ms (σ: 15.863255ms) 2025/09/12 06:17:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 2 (1280 bytes) for connection e586a4fc9dc34cc1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: b4b3c37233074919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1240, Data length: 268, Offset + Data length: 1508} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client -> Sending packet 3 (1280 bytes) for connection e586a4fc9dc34cc1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: b4b3c37233074919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1240, Data length: 268, Offset + Data length: 1508} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:43 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4b3c37233074919, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 448µs} 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:43 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b4b3c37233074919, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/12 06:17:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e586a4fc9dc34cc1, InitialSourceConnectionID: b4b3c37233074919, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x5486203bf8dd510949b9f3eae42d50ef, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:43 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dfbb708e922c7444, StatelessResetToken: 0xeddc99c6f0b502a250689fd11ea6e831} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f11f70a5740ea7f, StatelessResetToken: 0x368f530d0a5e19ac842d56bd89941632} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 71637b7de5ab838e, StatelessResetToken: 0xf49768f74d1ed34b7cc0706fc88ca9c3} 2025/09/12 06:17:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e586a4fc9dc34cc1 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: dfbb708e922c7444, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: dfbb708e922c7444, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 client Short Header{DestConnectionID: dfbb708e922c7444, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client Dropping Initial keys. 2025/09/12 06:17:43 client -> Sending packet 1 (43 bytes) for connection e586a4fc9dc34cc1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: dfbb708e922c7444, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client -> Sending packet 1 (36 bytes) for connection e586a4fc9dc34cc1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: dfbb708e922c7444, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 693.293µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 2 (74 bytes) for connection e586a4fc9dc34cc1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: dfbb708e922c7444, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 client -> Sending packet 3 (74 bytes) for connection e586a4fc9dc34cc1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: dfbb708e922c7444, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:43 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:43 client Dropping Handshake keys. 2025/09/12 06:17:43 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:43 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 3 (58 bytes) for connection e586a4fc9dc34cc1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: dfbb708e922c7444, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 112.201µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client -> Sending packet 4 (48 bytes) for connection e586a4fc9dc34cc1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: dfbb708e922c7444, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc04646af615424f, StatelessResetToken: 0xfa3c54b32b282f422ef6f69c5070dcd3} 2025/09/12 06:17:43 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:43 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:43 client <- Reading packet 7 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:43 client -> Sending packet 5 (37 bytes) for connection e586a4fc9dc34cc1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: dfbb708e922c7444, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 90.731µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:43 client -> Sending packet 6 (30 bytes) for connection e586a4fc9dc34cc1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: dfbb708e922c7444, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:43 client Connection e586a4fc9dc34cc1 closed. 2025/09/12 06:17:43 Requesting https://server4:443/vsjwvkrets. 2025/09/12 06:17:43 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:43 Increased send buffer size to 14336 kiB 2025/09/12 06:17:43 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:43 Created qlog file: /logs/qlog/3bdee1ba245eb8a541a9d76d44.sqlog 2025/09/12 06:17:43 client Starting new connection to server4 ([::]:48530 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3bdee1ba245eb8a541a9d76d44, version v1 2025/09/12 06:17:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:43 client -> Sending packet 0 (1280 bytes) for connection 3bdee1ba245eb8a541a9d76d44, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: 3bdee1ba245eb8a541a9d76d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 06:17:43 client -> Sending packet 1 (1280 bytes) for connection 3bdee1ba245eb8a541a9d76d44, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: 3bdee1ba245eb8a541a9d76d44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1235, Data length: 271, Offset + Data length: 1506} 2025/09/12 06:17:43 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9e5bf9107f00ba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:43 client Received first packet. Switching destination connection ID to: eb9e5bf9107f00ba 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 80µs} 2025/09/12 06:17:43 client newly acked packets (1): [0] 2025/09/12 06:17:43 client updated RTT: 31.729823ms (σ: 15.864911ms) 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:43 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9e5bf9107f00ba, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 328µs} 2025/09/12 06:17:43 client newly acked packets (1): [1] 2025/09/12 06:17:43 client updated RTT: 31.991ms (σ: 12.422ms) 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:43 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb9e5bf9107f00ba, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3bdee1ba245eb8a541a9d76d44, InitialSourceConnectionID: eb9e5bf9107f00ba, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xde1bc2096274fb6fc8227eaa6dde46b0, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:43 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eeb8db8488a7ad37, StatelessResetToken: 0x8c6e37c68524309c2ca56497ff73763a} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d2e0284b7da9250, StatelessResetToken: 0xc93e71b21e1905133fc44a6dbc97ab59} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2c7f983c3d785eeb, StatelessResetToken: 0x8c913b3ab16b8809c8c709b4bf664fd9} 2025/09/12 06:17:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3bdee1ba245eb8a541a9d76d44 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: eeb8db8488a7ad37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: eeb8db8488a7ad37, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 client Short Header{DestConnectionID: eeb8db8488a7ad37, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client Dropping Initial keys. 2025/09/12 06:17:43 client -> Sending packet 1 (89 bytes) for connection 3bdee1ba245eb8a541a9d76d44, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: eeb8db8488a7ad37, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Short Header{DestConnectionID: eeb8db8488a7ad37, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client -> Sending packet 2 (36 bytes) for connection 3bdee1ba245eb8a541a9d76d44, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: eeb8db8488a7ad37, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 667.463µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:43 client Dropping Handshake keys. 2025/09/12 06:17:43 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:43 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:43 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:43 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:43 client -> Sending packet 3 (37 bytes) for connection 3bdee1ba245eb8a541a9d76d44, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: eeb8db8488a7ad37, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 68.128µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:43 client -> Sending packet 4 (30 bytes) for connection 3bdee1ba245eb8a541a9d76d44, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: eeb8db8488a7ad37, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:43 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:43 client Connection 3bdee1ba245eb8a541a9d76d44 closed. 2025/09/12 06:17:43 Requesting https://server4:443/ukcoasjafy. 2025/09/12 06:17:43 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:43 Increased send buffer size to 14336 kiB 2025/09/12 06:17:43 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:43 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:43 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:43 Created qlog file: /logs/qlog/c98b7bc2cd006dbc9a3a18e18a42e93bf1.sqlog 2025/09/12 06:17:43 client Starting new connection to server4 ([::]:54123 -> 193.167.100.100:443), source connection ID (empty), destination connection ID c98b7bc2cd006dbc9a3a18e18a42e93bf1, version v1 2025/09/12 06:17:43 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:43 client -> Sending packet 0 (1280 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: c98b7bc2cd006dbc9a3a18e18a42e93bf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:43 client -> Sending packet 1 (1280 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: c98b7bc2cd006dbc9a3a18e18a42e93bf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:43 client -> Sending packet 2 (1280 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: c98b7bc2cd006dbc9a3a18e18a42e93bf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:43 client -> Sending packet 3 (1280 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: c98b7bc2cd006dbc9a3a18e18a42e93bf1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 06:17:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:43 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 823989688e37006a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:43 client Received first packet. Switching destination connection ID to: 823989688e37006a 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 120µs} 2025/09/12 06:17:43 client newly acked packets (1): [2] 2025/09/12 06:17:43 client updated RTT: 31.944976ms (σ: 15.972488ms) 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:43 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 823989688e37006a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:43 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 304µs} 2025/09/12 06:17:43 client newly acked packets (1): [3] 2025/09/12 06:17:43 client updated RTT: 32.192ms (σ: 12.476ms) 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:43 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:43 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 823989688e37006a, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:43 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 06:17:43 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:43 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: c98b7bc2cd006dbc9a3a18e18a42e93bf1, InitialSourceConnectionID: 823989688e37006a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xa537b6a4fc391945db2a44a5482f3bc2, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:43 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:43 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d73c46c136e44d3, StatelessResetToken: 0xd2415e6623a176efbc7770abdbdd0261} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bf335f32518aeba4, StatelessResetToken: 0x27355a73bbf97d7a2e7561665881b38a} 2025/09/12 06:17:43 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c95fcb9645a55ad1, StatelessResetToken: 0x76bae6a0c165a585e4a3d2b93e26ce57} 2025/09/12 06:17:43 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:43 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1 2025/09/12 06:17:43 client Long Header{Type: Initial, DestConnectionID: 2d73c46c136e44d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: 2d73c46c136e44d3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:43 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:43 client Dropping Initial keys. 2025/09/12 06:17:43 client -> Sending packet 1 (89 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Handshake 2025/09/12 06:17:43 client Long Header{Type: Handshake, DestConnectionID: 2d73c46c136e44d3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:43 client -> Sending packet 2 (36 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:43 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:43 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 659.087µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:44 client -> Sending packet 2 (74 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Handshake 2025/09/12 06:17:44 client Long Header{Type: Handshake, DestConnectionID: 2d73c46c136e44d3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:44 client -> Sending packet 3 (74 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, Handshake 2025/09/12 06:17:44 client Long Header{Type: Handshake, DestConnectionID: 2d73c46c136e44d3, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:44 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:44 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:44 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:44 client Dropping Handshake keys. 2025/09/12 06:17:44 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:44 client -> Sending packet 4 (37 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 78.567µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:44 client Skipping packet number 3 2025/09/12 06:17:44 client -> Sending packet 5 (46 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:44 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:44 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:44 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e1a85a9b2d424b8d, StatelessResetToken: 0xa5a62e758ff4ed7092ae3b10f87fbb1d} 2025/09/12 06:17:44 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:44 client -> Sending packet 6 (37 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 135.494µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:44 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 06:17:44 client -> Sending packet 8 (29 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:44 client Skipping packet number 7 2025/09/12 06:17:44 client -> Sending packet 9 (46 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:44 client -> Sending packet 10 (1366 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.PingFrame{} 2025/09/12 06:17:44 client <- Reading packet 6 (30 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:44 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:44 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:44 client newly acked packets (1): [8] 2025/09/12 06:17:44 client updated RTT: 32.009ms (σ: 9.722ms) 2025/09/12 06:17:44 client ECN capability confirmed. 2025/09/12 06:17:44 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:44 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:44 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:44 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:44 client <- Reading packet 9 (30 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:44 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:44 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 40µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:44 client newly acked packets (2): [9 10] 2025/09/12 06:17:44 client updated RTT: 31.987ms (σ: 7.334ms) 2025/09/12 06:17:44 client Canceling loss detection timer. 2025/09/12 06:17:44 client Sending ACK because the ACK timer expired. 2025/09/12 06:17:44 client -> Sending packet 11 (40 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 25.295629ms, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:44 client <- Reading packet 10 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:44 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:44 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:44 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:44 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:44 client -> Sending packet 12 (30 bytes) for connection c98b7bc2cd006dbc9a3a18e18a42e93bf1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:44 client Short Header{DestConnectionID: 2d73c46c136e44d3, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:44 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:44 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:44 client Connection c98b7bc2cd006dbc9a3a18e18a42e93bf1 closed. 2025/09/12 06:17:44 Requesting https://server4:443/bmefdkzktj. 2025/09/12 06:17:44 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:44 Increased send buffer size to 14336 kiB 2025/09/12 06:17:44 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:44 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:44 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:44 Created qlog file: /logs/qlog/d2e456939fd99aafce33f8b1acc2.sqlog 2025/09/12 06:17:44 client Starting new connection to server4 ([::]:48098 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d2e456939fd99aafce33f8b1acc2, version v1 2025/09/12 06:17:44 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:44 client -> Sending packet 0 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: d2e456939fd99aafce33f8b1acc2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:44 client -> Sending packet 1 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: d2e456939fd99aafce33f8b1acc2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 1234, Data length: 283, Offset + Data length: 1517} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:44 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:44 client Received first packet. Switching destination connection ID to: b4610b2d43e3598c 2025/09/12 06:17:44 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/09/12 06:17:44 client newly acked packets (1): [0] 2025/09/12 06:17:44 client updated RTT: 31.777116ms (σ: 15.888558ms) 2025/09/12 06:17:44 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:44 client -> Sending packet 2 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 1234, Data length: 283, Offset + Data length: 1517} 2025/09/12 06:17:44 client -> Sending packet 3 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 1234, Data length: 283, Offset + Data length: 1517} 2025/09/12 06:17:44 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:44 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:44 client <- Reading packet 2 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:44 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs} 2025/09/12 06:17:44 client newly acked packets (1): [3] 2025/09/12 06:17:44 client updated RTT: 31.943ms (σ: 12.248ms) 2025/09/12 06:17:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:44 client -> Sending packet 4 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:44 client -> &wire.PingFrame{} 2025/09/12 06:17:44 client <- Reading packet 3 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:44 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/09/12 06:17:44 client newly acked packets (1): [4] 2025/09/12 06:17:44 client updated RTT: 31.929ms (σ: 9.213ms) 2025/09/12 06:17:44 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:44 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:44 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:44 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:44 client -> Sending packet 5 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:44 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:44 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:44 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:45 client -> Sending packet 6 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:45 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:45 client -> &wire.PingFrame{} 2025/09/12 06:17:45 client <- Reading packet 6 (44 bytes) for connection (empty), Initial 2025/09/12 06:17:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 26, Version: v1} 2025/09/12 06:17:45 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/09/12 06:17:45 client newly acked packets (1): [6] 2025/09/12 06:17:45 client updated RTT: 31.914ms (σ: 6.937ms) 2025/09/12 06:17:45 client -> Sending packet 7 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:45 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:45 client -> &wire.PingFrame{} 2025/09/12 06:17:45 client <- Reading packet 7 (44 bytes) for connection (empty), Initial 2025/09/12 06:17:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 26, Version: v1} 2025/09/12 06:17:45 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/09/12 06:17:45 client newly acked packets (1): [7] 2025/09/12 06:17:45 client updated RTT: 31.921ms (σ: 5.218ms) 2025/09/12 06:17:45 client <- Reading packet 9 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:45 client -> Sending packet 8 (1280 bytes) for connection d2e456939fd99aafce33f8b1acc2, Initial 2025/09/12 06:17:45 client Long Header{Type: Initial, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:45 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client <- Reading packet 3 (769 bytes) for connection (empty), Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b4610b2d43e3598c, PacketNumber: 3, PacketNumberLen: 1, Length: 752, Version: v1} 2025/09/12 06:17:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 731, Offset + Data length: 731} 2025/09/12 06:17:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d2e456939fd99aafce33f8b1acc2, InitialSourceConnectionID: b4610b2d43e3598c, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x2992fab0f190b62b634ffed8d18bca3a, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:46 client -> Sending packet 0 (82 bytes) for connection d2e456939fd99aafce33f8b1acc2, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: b4610b2d43e3598c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client Dropping Initial keys. 2025/09/12 06:17:46 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6a7be1f9702b34d9, StatelessResetToken: 0xe0e65f9a5821ee43b4325f979187154d} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4956028e5b11297, StatelessResetToken: 0x4d1272cbd2d07edcd02eda7ba67eee95} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58b3034c09236bec, StatelessResetToken: 0x515e301f93e8caa6ed0c31c7efdceaba} 2025/09/12 06:17:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:46 client -> Sending packet 0 (59 bytes) for connection d2e456939fd99aafce33f8b1acc2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: 6a7be1f9702b34d9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.541873925s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:46 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6abea7001b86f8b1, StatelessResetToken: 0x3e9566a70d04f545c2d1b6bb0f8d6059} 2025/09/12 06:17:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:46 client -> Sending packet 1 (37 bytes) for connection d2e456939fd99aafce33f8b1acc2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: 6a7be1f9702b34d9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 101.29µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:46 client -> Sending packet 2 (39 bytes) for connection d2e456939fd99aafce33f8b1acc2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: 6a7be1f9702b34d9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 58.63µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:46 client -> Sending packet 1 (74 bytes) for connection d2e456939fd99aafce33f8b1acc2, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: 6a7be1f9702b34d9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client -> Sending packet 2 (74 bytes) for connection d2e456939fd99aafce33f8b1acc2, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: 6a7be1f9702b34d9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 06:17:46 client -> Sending packet 3 (74 bytes) for connection d2e456939fd99aafce33f8b1acc2, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: 6a7be1f9702b34d9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client -> Sending packet 4 (74 bytes) for connection d2e456939fd99aafce33f8b1acc2, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: 6a7be1f9702b34d9, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client <- Reading packet 7 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:46 client -> Sending packet 3 (41 bytes) for connection d2e456939fd99aafce33f8b1acc2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: 6a7be1f9702b34d9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 133.901µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:46 client -> Sending packet 5 (69 bytes) for connection d2e456939fd99aafce33f8b1acc2, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: 6a7be1f9702b34d9, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:46 client Short Header{DestConnectionID: 6a7be1f9702b34d9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:46 client Connection d2e456939fd99aafce33f8b1acc2 closed. 2025/09/12 06:17:46 Requesting https://server4:443/lbdsdvsfuv. 2025/09/12 06:17:46 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:46 Increased send buffer size to 14336 kiB 2025/09/12 06:17:46 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:46 Created qlog file: /logs/qlog/b626fa0404ba40d0509cfa.sqlog 2025/09/12 06:17:46 client Starting new connection to server4 ([::]:37321 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b626fa0404ba40d0509cfa, version v1 2025/09/12 06:17:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:46 client -> Sending packet 0 (1280 bytes) for connection b626fa0404ba40d0509cfa, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: b626fa0404ba40d0509cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 06:17:46 client -> Sending packet 1 (1280 bytes) for connection b626fa0404ba40d0509cfa, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: b626fa0404ba40d0509cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/12 06:17:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:46 client -> Sending packet 2 (1280 bytes) for connection b626fa0404ba40d0509cfa, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: b626fa0404ba40d0509cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1170, Offset + Data length: 1237} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:46 client -> Sending packet 3 (1280 bytes) for connection b626fa0404ba40d0509cfa, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: b626fa0404ba40d0509cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/12 06:17:46 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e15f16ff2d927c40, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:46 client Received first packet. Switching destination connection ID to: e15f16ff2d927c40 2025/09/12 06:17:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104µs} 2025/09/12 06:17:46 client newly acked packets (1): [2] 2025/09/12 06:17:46 client updated RTT: 32.134634ms (σ: 16.067317ms) 2025/09/12 06:17:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:46 client -> Sending packet 4 (1280 bytes) for connection b626fa0404ba40d0509cfa, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: e15f16ff2d927c40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:46 client -> Sending packet 5 (1280 bytes) for connection b626fa0404ba40d0509cfa, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: e15f16ff2d927c40, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 1237, Data length: 272, Offset + Data length: 1509} 2025/09/12 06:17:46 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:46 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e15f16ff2d927c40, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 424µs} 2025/09/12 06:17:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:46 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e15f16ff2d927c40, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 06:17:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b626fa0404ba40d0509cfa, InitialSourceConnectionID: e15f16ff2d927c40, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x56469f52ce07baaeb6098a5c2207ce12, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:46 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fec65f240695f919, StatelessResetToken: 0xd3fb5575203efb997fd8a81cc91a5eaf} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b432b87b0f097dc, StatelessResetToken: 0xd2532e435071090cb0b46deb8565ae4b} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 92d66c23fe86faba, StatelessResetToken: 0xc6aef6e462d588ff43858f58ce60b27d} 2025/09/12 06:17:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b626fa0404ba40d0509cfa 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: fec65f240695f919, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: fec65f240695f919, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client Short Header{DestConnectionID: fec65f240695f919, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:46 client Dropping Initial keys. 2025/09/12 06:17:46 client -> Sending packet 1 (43 bytes) for connection b626fa0404ba40d0509cfa, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: fec65f240695f919, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client -> Sending packet 1 (36 bytes) for connection b626fa0404ba40d0509cfa, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: fec65f240695f919, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 714.863µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:46 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:46 client -> Sending packet 2 (37 bytes) for connection b626fa0404ba40d0509cfa, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: fec65f240695f919, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 134.73µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:46 client -> Sending packet 2 (69 bytes) for connection b626fa0404ba40d0509cfa, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: fec65f240695f919, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:46 client Short Header{DestConnectionID: fec65f240695f919, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:46 client Connection b626fa0404ba40d0509cfa closed. 2025/09/12 06:17:46 Requesting https://server4:443/wwtcnkoyye. 2025/09/12 06:17:46 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:46 Increased send buffer size to 14336 kiB 2025/09/12 06:17:46 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:46 Created qlog file: /logs/qlog/863a9506de431084670ac050ac158278c2150f.sqlog 2025/09/12 06:17:46 client Starting new connection to server4 ([::]:56536 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 863a9506de431084670ac050ac158278c2150f, version v1 2025/09/12 06:17:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:46 client -> Sending packet 0 (1280 bytes) for connection 863a9506de431084670ac050ac158278c2150f, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: 863a9506de431084670ac050ac158278c2150f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:46 client -> Sending packet 1 (1280 bytes) for connection 863a9506de431084670ac050ac158278c2150f, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: 863a9506de431084670ac050ac158278c2150f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:46 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e6852cc653071cd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:46 client Received first packet. Switching destination connection ID to: 5e6852cc653071cd 2025/09/12 06:17:46 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 72µs} 2025/09/12 06:17:46 client newly acked packets (1): [0] 2025/09/12 06:17:46 client updated RTT: 31.697448ms (σ: 15.848724ms) 2025/09/12 06:17:46 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:46 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e6852cc653071cd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 312µs} 2025/09/12 06:17:46 client newly acked packets (1): [1] 2025/09/12 06:17:46 client updated RTT: 31.958ms (σ: 12.409ms) 2025/09/12 06:17:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:46 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e6852cc653071cd, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 06:17:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 863a9506de431084670ac050ac158278c2150f, InitialSourceConnectionID: 5e6852cc653071cd, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x09c94fa7e34f9d2d241b699d48826b9d, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:46 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec2e7458b385a110, StatelessResetToken: 0x17c5f319ec9f1dd211f1d24e538dd7ed} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d49008e14472b0a6, StatelessResetToken: 0x6b6b3bc960fab6e9686be2573b25c28f} 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c66fdc62646c7a93, StatelessResetToken: 0x5e9a0f38dcf05a6eb22bb7cebf4c094f} 2025/09/12 06:17:46 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 863a9506de431084670ac050ac158278c2150f 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: ec2e7458b385a110, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: ec2e7458b385a110, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:46 client Short Header{DestConnectionID: ec2e7458b385a110, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:46 client Dropping Initial keys. 2025/09/12 06:17:46 client -> Sending packet 1 (89 bytes) for connection 863a9506de431084670ac050ac158278c2150f, Handshake 2025/09/12 06:17:46 client Long Header{Type: Handshake, DestConnectionID: ec2e7458b385a110, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Short Header{DestConnectionID: ec2e7458b385a110, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:46 client -> Sending packet 2 (36 bytes) for connection 863a9506de431084670ac050ac158278c2150f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: ec2e7458b385a110, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 809.661µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client <- Reading packet 2 (51 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 16µs} 2025/09/12 06:17:46 client Peer doesn't await address validation any longer. 2025/09/12 06:17:46 client newly acked packets (2): [0 1] 2025/09/12 06:17:46 client updated RTT: 31.925ms (σ: 9.371ms) 2025/09/12 06:17:46 client Canceling loss detection timer. 2025/09/12 06:17:46 client Dropping Handshake keys. 2025/09/12 06:17:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3fa5af5068cc23db, StatelessResetToken: 0xbc6d2dbd7b38726ee9d58767a76e4af4} 2025/09/12 06:17:46 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:46 client -> Sending packet 3 (37 bytes) for connection 863a9506de431084670ac050ac158278c2150f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: ec2e7458b385a110, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 142.878µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:46 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:46 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:46 client -> Sending packet 4 (37 bytes) for connection 863a9506de431084670ac050ac158278c2150f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: ec2e7458b385a110, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 28.54µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:46 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:46 client -> Sending packet 5 (30 bytes) for connection 863a9506de431084670ac050ac158278c2150f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:46 client Short Header{DestConnectionID: ec2e7458b385a110, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:46 client Connection 863a9506de431084670ac050ac158278c2150f closed. 2025/09/12 06:17:46 Requesting https://server4:443/wqsobqpuzs. 2025/09/12 06:17:46 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:46 Increased send buffer size to 14336 kiB 2025/09/12 06:17:46 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:46 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:46 Created qlog file: /logs/qlog/9564a924dc8526e67f.sqlog 2025/09/12 06:17:46 client Starting new connection to server4 ([::]:57059 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9564a924dc8526e67f, version v1 2025/09/12 06:17:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:46 client -> Sending packet 0 (1280 bytes) for connection 9564a924dc8526e67f, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: 9564a924dc8526e67f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:46 client -> Sending packet 1 (1280 bytes) for connection 9564a924dc8526e67f, Initial 2025/09/12 06:17:46 client Long Header{Type: Initial, DestConnectionID: 9564a924dc8526e67f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 06:17:46 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:47 client -> Sending packet 2 (1280 bytes) for connection 9564a924dc8526e67f, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 9564a924dc8526e67f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:47 client -> Sending packet 3 (1280 bytes) for connection 9564a924dc8526e67f, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 9564a924dc8526e67f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:47 client -> Sending packet 4 (1280 bytes) for connection 9564a924dc8526e67f, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 9564a924dc8526e67f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:47 client -> Sending packet 5 (1280 bytes) for connection 9564a924dc8526e67f, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 9564a924dc8526e67f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client <- Reading packet 1 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6babf5e0c7b803e2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:47 client Received first packet. Switching destination connection ID to: 6babf5e0c7b803e2 2025/09/12 06:17:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/09/12 06:17:47 client newly acked packets (1): [4] 2025/09/12 06:17:47 client updated RTT: 31.900526ms (σ: 15.950263ms) 2025/09/12 06:17:47 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:47 client <- Reading packet 2 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6babf5e0c7b803e2, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:47 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 328µs} 2025/09/12 06:17:47 client newly acked packets (1): [5] 2025/09/12 06:17:47 client updated RTT: 32.164ms (σ: 12.492ms) 2025/09/12 06:17:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:47 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6babf5e0c7b803e2, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 727, Offset + Data length: 727} 2025/09/12 06:17:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9564a924dc8526e67f, InitialSourceConnectionID: 6babf5e0c7b803e2, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x3a9f6583e1b104288486ba54f9ed9e6c, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9564a924dc8526e67f 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6babf5e0c7b803e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: 6babf5e0c7b803e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:47 client Dropping Initial keys. 2025/09/12 06:17:47 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c51afdcb2d28255, StatelessResetToken: 0xa39a9462154dcf6bccb7632c92f16ca3} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cfdcf85971a90027, StatelessResetToken: 0x876174a7c81df679a192669e46057a59} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 20e3077e6e4bd018, StatelessResetToken: 0x5ce7e670b83f3fad033b81e789ddad51} 2025/09/12 06:17:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:47 client -> Sending packet 1 (91 bytes) for connection 9564a924dc8526e67f, Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: 4c51afdcb2d28255, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client Short Header{DestConnectionID: 4c51afdcb2d28255, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:47 client -> Sending packet 1 (36 bytes) for connection 9564a924dc8526e67f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:47 client Short Header{DestConnectionID: 4c51afdcb2d28255, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752.62µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2476cbe3b6b5383e, StatelessResetToken: 0xdb183793f4c59c51c0779de31d8635e7} 2025/09/12 06:17:47 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:47 client -> Sending packet 2 (37 bytes) for connection 9564a924dc8526e67f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:47 client Short Header{DestConnectionID: 4c51afdcb2d28255, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 69.02µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:47 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:47 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:47 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:47 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:47 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:47 client -> Sending packet 3 (37 bytes) for connection 9564a924dc8526e67f, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:47 client Short Header{DestConnectionID: 4c51afdcb2d28255, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 69.611µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:47 client -> Sending packet 2 (69 bytes) for connection 9564a924dc8526e67f, Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: 4c51afdcb2d28255, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:47 client Short Header{DestConnectionID: 4c51afdcb2d28255, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:47 client Connection 9564a924dc8526e67f closed. 2025/09/12 06:17:47 Requesting https://server4:443/rmgiwqjpwt. 2025/09/12 06:17:47 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:47 Increased send buffer size to 14336 kiB 2025/09/12 06:17:47 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:47 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:47 Created qlog file: /logs/qlog/2a25dc1525ea18a352e2.sqlog 2025/09/12 06:17:47 client Starting new connection to server4 ([::]:59371 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2a25dc1525ea18a352e2, version v1 2025/09/12 06:17:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:47 client -> Sending packet 0 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 2a25dc1525ea18a352e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:47 client -> Sending packet 1 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 2a25dc1525ea18a352e2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 06:17:47 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bfef9dc391e43d6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:47 client Received first packet. Switching destination connection ID to: 6bfef9dc391e43d6 2025/09/12 06:17:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:47 client newly acked packets (1): [0] 2025/09/12 06:17:47 client updated RTT: 31.674726ms (σ: 15.837363ms) 2025/09/12 06:17:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:47 client -> Sending packet 2 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 06:17:47 client -> Sending packet 3 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:47 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:47 client -> Sending packet 4 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client -> Sending packet 5 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 1238, Data length: 270, Offset + Data length: 1508} 2025/09/12 06:17:47 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bfef9dc391e43d6, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client -> Sending packet 6 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:47 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bfef9dc391e43d6, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:47 client -> Sending packet 7 (1280 bytes) for connection 2a25dc1525ea18a352e2, Initial 2025/09/12 06:17:47 client Long Header{Type: Initial, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client <- Reading packet 1 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6bfef9dc391e43d6, PacketNumber: 1, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2a25dc1525ea18a352e2, InitialSourceConnectionID: 6bfef9dc391e43d6, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x366e9e2204f35690ca470e62626d24c0, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:47 client -> Sending packet 0 (82 bytes) for connection 2a25dc1525ea18a352e2, Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: 6bfef9dc391e43d6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:47 client Dropping Initial keys. 2025/09/12 06:17:47 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: caaae3f188697e55, StatelessResetToken: 0x449829a9d5a5fa79bbb97a00f70a3d96} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ad4d87314a609801, StatelessResetToken: 0x56e1095f6d17e2cd08dbfc5f388d50f8} 2025/09/12 06:17:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f90553135cd1ce9a, StatelessResetToken: 0x54b7b8a39cc32d31fd83d05ce1737008} 2025/09/12 06:17:47 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:47 client -> Sending packet 0 (59 bytes) for connection 2a25dc1525ea18a352e2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:47 client Short Header{DestConnectionID: caaae3f188697e55, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 333.791688ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:47 client <- Reading packet 2 (766 bytes) for connection (empty), Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6bfef9dc391e43d6, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/09/12 06:17:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:47 client -> Sending packet 1 (43 bytes) for connection 2a25dc1525ea18a352e2, Handshake 2025/09/12 06:17:47 client Long Header{Type: Handshake, DestConnectionID: caaae3f188697e55, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:48 client -> Sending packet 2 (74 bytes) for connection 2a25dc1525ea18a352e2, Handshake 2025/09/12 06:17:48 client Long Header{Type: Handshake, DestConnectionID: caaae3f188697e55, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:48 client -> Sending packet 3 (74 bytes) for connection 2a25dc1525ea18a352e2, Handshake 2025/09/12 06:17:48 client Long Header{Type: Handshake, DestConnectionID: caaae3f188697e55, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:48 client <- Reading packet 2 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f90553135cd1ce9a, StatelessResetToken: 0x54b7b8a39cc32d31fd83d05ce1737008} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ad4d87314a609801, StatelessResetToken: 0x56e1095f6d17e2cd08dbfc5f388d50f8} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: caaae3f188697e55, StatelessResetToken: 0x449829a9d5a5fa79bbb97a00f70a3d96} 2025/09/12 06:17:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:48 client <- Reading packet 3 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:48 client Dropping Handshake keys. 2025/09/12 06:17:48 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:48 client -> Sending packet 2 (58 bytes) for connection 2a25dc1525ea18a352e2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: caaae3f188697e55, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 151.374µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:48 client -> Sending packet 3 (48 bytes) for connection 2a25dc1525ea18a352e2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: caaae3f188697e55, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:48 client <- Reading packet 4 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client newly acked packets (1): [3] 2025/09/12 06:17:48 client updated RTT: 31.562ms (σ: 12.1ms) 2025/09/12 06:17:48 client ECN capability confirmed. 2025/09/12 06:17:48 client Canceling loss detection timer. 2025/09/12 06:17:48 client <- Reading packet 5 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dfcdbfbc68102e8f, StatelessResetToken: 0x74c9ddb4c864a0b7b73533bc4a618838} 2025/09/12 06:17:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:48 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:48 client -> Sending packet 4 (37 bytes) for connection 2a25dc1525ea18a352e2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: caaae3f188697e55, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 53.451µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client <- Reading packet 7 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:48 client -> Sending packet 5 (30 bytes) for connection 2a25dc1525ea18a352e2, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: caaae3f188697e55, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:48 client Connection 2a25dc1525ea18a352e2 closed. 2025/09/12 06:17:48 Requesting https://server4:443/yteaynvbwv. 2025/09/12 06:17:48 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:48 Increased send buffer size to 14336 kiB 2025/09/12 06:17:48 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:48 Created qlog file: /logs/qlog/2ea8c0b35bbe9393023ad263ebaa5651b0.sqlog 2025/09/12 06:17:48 client Starting new connection to server4 ([::]:51355 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2ea8c0b35bbe9393023ad263ebaa5651b0, version v1 2025/09/12 06:17:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:48 client -> Sending packet 0 (1280 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: 2ea8c0b35bbe9393023ad263ebaa5651b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:48 client -> Sending packet 1 (1280 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: 2ea8c0b35bbe9393023ad263ebaa5651b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 06:17:48 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a801501bdc3c3ae6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:48 client Received first packet. Switching destination connection ID to: a801501bdc3c3ae6 2025/09/12 06:17:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120µs} 2025/09/12 06:17:48 client newly acked packets (1): [1] 2025/09/12 06:17:48 client updated RTT: 32.711139ms (σ: 16.355569ms) 2025/09/12 06:17:48 client setting loss timer for packet 0 (Initial) to 36.800031ms (in 2025-09-12 06:17:48.260647846 +0000 UTC m=+27.767757632) 2025/09/12 06:17:48 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:48.260647846 +0000 UTC m=+27.767757632 2025/09/12 06:17:48 client lost packet 0 (time threshold) 2025/09/12 06:17:48 client -> Sending packet 2 (1280 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: a801501bdc3c3ae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:48 client -> Sending packet 3 (1280 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: a801501bdc3c3ae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:48 client -> Sending packet 4 (1280 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: a801501bdc3c3ae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:48 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:48 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a801501bdc3c3ae6, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:48 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 392µs} 2025/09/12 06:17:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:48 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:48 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a801501bdc3c3ae6, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 06:17:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2ea8c0b35bbe9393023ad263ebaa5651b0, InitialSourceConnectionID: a801501bdc3c3ae6, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xd323240c83ead2c0daef61146a9c55c4, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: a801501bdc3c3ae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client Long Header{Type: Handshake, DestConnectionID: a801501bdc3c3ae6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:48 client Dropping Initial keys. 2025/09/12 06:17:48 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f078f31ade66421, StatelessResetToken: 0xcea052568046061faa684ed32eb86508} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 13b1da6462d589ba, StatelessResetToken: 0xe6938b159163f631fb2ad2ce732ba431} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6dbb575768ed43a7, StatelessResetToken: 0x5036f83fc642bf55b20f4a908f99c7a1} 2025/09/12 06:17:48 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:48 client -> Sending packet 1 (72 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, Handshake 2025/09/12 06:17:48 client Long Header{Type: Handshake, DestConnectionID: 6f078f31ade66421, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:48 client -> Sending packet 1 (55 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 571.106µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:48 client <- Reading packet 1 (27 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:48 client Dropping Handshake keys. 2025/09/12 06:17:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client newly acked packets (2): [0 1] 2025/09/12 06:17:48 client updated RTT: 32.593ms (σ: 12.5ms) 2025/09/12 06:17:48 client ECN capability confirmed. 2025/09/12 06:17:48 client Canceling loss detection timer. 2025/09/12 06:17:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:48 client Ignoring all packets below 1. 2025/09/12 06:17:48 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c1a799b4d32dbdbe, StatelessResetToken: 0x7bb7990540543585b205705c3afdde43} 2025/09/12 06:17:48 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:48 client -> Sending packet 2 (35 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 150.133µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:48 client -> Sending packet 3 (37 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 54.603µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:48 client <- Reading packet 7 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.PingFrame{} 2025/09/12 06:17:48 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:48 client -> Sending packet 4 (39 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 84.098µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:48 client <- Reading packet 8 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:48 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:48 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:48 client -> Sending packet 5 (1366 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.PingFrame{} 2025/09/12 06:17:48 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:48 client -> Sending packet 6 (30 bytes) for connection 2ea8c0b35bbe9393023ad263ebaa5651b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:48 client Short Header{DestConnectionID: 6f078f31ade66421, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:48 client Connection 2ea8c0b35bbe9393023ad263ebaa5651b0 closed. 2025/09/12 06:17:48 Requesting https://server4:443/zjbvxodklc. 2025/09/12 06:17:48 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:48 Increased send buffer size to 14336 kiB 2025/09/12 06:17:48 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:48 Created qlog file: /logs/qlog/3bdef133c13f72d7970164f64847678fd6.sqlog 2025/09/12 06:17:48 client Starting new connection to server4 ([::]:39784 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3bdef133c13f72d7970164f64847678fd6, version v1 2025/09/12 06:17:48 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:48 client -> Sending packet 0 (1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: 3bdef133c13f72d7970164f64847678fd6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:48 client -> Sending packet 1 (1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: 3bdef133c13f72d7970164f64847678fd6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:48 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:48 client -> Sending packet 2 (1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: 3bdef133c13f72d7970164f64847678fd6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:48 client -> Sending packet 3 (1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Initial 2025/09/12 06:17:48 client Long Header{Type: Initial, DestConnectionID: 3bdef133c13f72d7970164f64847678fd6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 06:17:48 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:48 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:49 client -> Sending packet 4 (1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 3bdef133c13f72d7970164f64847678fd6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:49 client -> Sending packet 5 (1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 3bdef133c13f72d7970164f64847678fd6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 273, Offset + Data length: 1504} 2025/09/12 06:17:49 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:49 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ff2d9e36bbfcf034, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:49 client Received first packet. Switching destination connection ID to: ff2d9e36bbfcf034 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 392µs} 2025/09/12 06:17:49 client newly acked packets (1): [4] 2025/09/12 06:17:49 client updated RTT: 33.299765ms (σ: 16.649882ms) 2025/09/12 06:17:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:49 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff2d9e36bbfcf034, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 735, Offset + Data length: 735} 2025/09/12 06:17:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3bdef133c13f72d7970164f64847678fd6, InitialSourceConnectionID: ff2d9e36bbfcf034, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x1623c999943ae2aa27ca25336723444c, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:49 client <- Reading packet 2 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ff2d9e36bbfcf034, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 40µs} 2025/09/12 06:17:49 client newly acked packets (1): [5] 2025/09/12 06:17:49 client updated RTT: 33.306ms (σ: 12.5ms) 2025/09/12 06:17:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3bdef133c13f72d7970164f64847678fd6 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: ff2d9e36bbfcf034, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: ff2d9e36bbfcf034, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:49 client Dropping Initial keys. 2025/09/12 06:17:49 client -> Sending packet 1 (43 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: ff2d9e36bbfcf034, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client -> Sending packet 0 (46 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: ff2d9e36bbfcf034, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:49 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:49 client Dropping Handshake keys. 2025/09/12 06:17:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:49 client -> Sending packet 1 (35 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: ff2d9e36bbfcf034, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 88.687µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:49 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:49 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:49 client -> Sending packet 2 (30 bytes) for connection 3bdef133c13f72d7970164f64847678fd6, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: ff2d9e36bbfcf034, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:49 client Connection 3bdef133c13f72d7970164f64847678fd6 closed. 2025/09/12 06:17:49 Requesting https://server4:443/cotzovybiu. 2025/09/12 06:17:49 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:49 Increased send buffer size to 14336 kiB 2025/09/12 06:17:49 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:49 Created qlog file: /logs/qlog/7c712861cfeb173f710a09fd28dbef9240.sqlog 2025/09/12 06:17:49 client Starting new connection to server4 ([::]:42104 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7c712861cfeb173f710a09fd28dbef9240, version v1 2025/09/12 06:17:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:49 client -> Sending packet 0 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 7c712861cfeb173f710a09fd28dbef9240, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:49 client -> Sending packet 1 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 7c712861cfeb173f710a09fd28dbef9240, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 06:17:49 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d29814518fb87f9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:49 client Received first packet. Switching destination connection ID to: 8d29814518fb87f9 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88µs} 2025/09/12 06:17:49 client newly acked packets (1): [0] 2025/09/12 06:17:49 client updated RTT: 31.740692ms (σ: 15.870346ms) 2025/09/12 06:17:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:49 client -> Sending packet 2 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client -> Sending packet 3 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:49 client -> Sending packet 4 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 06:17:49 client -> Sending packet 5 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 06:17:49 client <- Reading packet 4 (42 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d29814518fb87f9, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 72µs} 2025/09/12 06:17:49 client newly acked packets (1): [5] 2025/09/12 06:17:49 client updated RTT: 31.883ms (σ: 12.189ms) 2025/09/12 06:17:49 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d29814518fb87f9, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client -> Sending packet 6 (1280 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client <- Reading packet 1 (772 bytes) for connection (empty), Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d29814518fb87f9, PacketNumber: 1, PacketNumberLen: 1, Length: 755, Version: v1} 2025/09/12 06:17:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 734, Offset + Data length: 734} 2025/09/12 06:17:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7c712861cfeb173f710a09fd28dbef9240, InitialSourceConnectionID: 8d29814518fb87f9, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x41598a6d3523cd109fb35d43e2950c50, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:49 client -> Sending packet 0 (82 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:49 client Dropping Initial keys. 2025/09/12 06:17:49 client -> Sending packet 0 (46 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: 8d29814518fb87f9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:49 client <- Reading packet 2 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:49 client <- Reading packet 3 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:49 client -> Sending packet 1 (35 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: 8d29814518fb87f9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 94.939µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:49 client -> Sending packet 1 (69 bytes) for connection 7c712861cfeb173f710a09fd28dbef9240, Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: 8d29814518fb87f9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:49 client Short Header{DestConnectionID: 8d29814518fb87f9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:49 client Connection 7c712861cfeb173f710a09fd28dbef9240 closed. 2025/09/12 06:17:49 Requesting https://server4:443/jvlwlenull. 2025/09/12 06:17:49 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:49 Increased send buffer size to 14336 kiB 2025/09/12 06:17:49 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:49 Created qlog file: /logs/qlog/ee3d61a50baa827758b9e84cecd953a8325e.sqlog 2025/09/12 06:17:49 client Starting new connection to server4 ([::]:34503 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ee3d61a50baa827758b9e84cecd953a8325e, version v1 2025/09/12 06:17:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:49 client -> Sending packet 0 (1280 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: ee3d61a50baa827758b9e84cecd953a8325e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 06:17:49 client -> Sending packet 1 (1280 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: ee3d61a50baa827758b9e84cecd953a8325e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1230, Data length: 288, Offset + Data length: 1518} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b08716d84b59572c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:49 client Received first packet. Switching destination connection ID to: b08716d84b59572c 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96µs} 2025/09/12 06:17:49 client newly acked packets (1): [0] 2025/09/12 06:17:49 client updated RTT: 31.736531ms (σ: 15.868265ms) 2025/09/12 06:17:49 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:49 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b08716d84b59572c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 296µs} 2025/09/12 06:17:49 client newly acked packets (1): [1] 2025/09/12 06:17:49 client updated RTT: 31.994ms (σ: 12.417ms) 2025/09/12 06:17:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:49 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b08716d84b59572c, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 736, Offset + Data length: 736} 2025/09/12 06:17:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ee3d61a50baa827758b9e84cecd953a8325e, InitialSourceConnectionID: b08716d84b59572c, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xb367cb7e7ae396739648e2ca41477b5e, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: b08716d84b59572c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1188, Version: v1} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: b08716d84b59572c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:49 client Dropping Initial keys. 2025/09/12 06:17:49 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef59a5007b65ae53, StatelessResetToken: 0x8daabbb33b7f2f5c4fdb4ceedca16992} 2025/09/12 06:17:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21a24174841c6f77, StatelessResetToken: 0xf48ab2ec7b8bae7d00571603dbde8b85} 2025/09/12 06:17:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 89087296342dd6d2, StatelessResetToken: 0x70a15dfcb9a1c1c4b6a5c339667917b3} 2025/09/12 06:17:49 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:49 client -> Sending packet 1 (91 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: ef59a5007b65ae53, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client Short Header{DestConnectionID: ef59a5007b65ae53, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:49 client -> Sending packet 1 (36 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: ef59a5007b65ae53, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 599.687µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 566e35a36946d7ed, StatelessResetToken: 0x808b131b39fc4142ed83a249ed1709e7} 2025/09/12 06:17:49 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:49 client -> Sending packet 2 (37 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: ef59a5007b65ae53, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64.1µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:49 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:49 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:49 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:49 client -> Sending packet 3 (37 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:49 client Short Header{DestConnectionID: ef59a5007b65ae53, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 89.989µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:49 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:49 client -> Sending packet 2 (69 bytes) for connection ee3d61a50baa827758b9e84cecd953a8325e, Handshake 2025/09/12 06:17:49 client Long Header{Type: Handshake, DestConnectionID: ef59a5007b65ae53, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:49 client Short Header{DestConnectionID: ef59a5007b65ae53, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:49 client Connection ee3d61a50baa827758b9e84cecd953a8325e closed. 2025/09/12 06:17:49 Requesting https://server4:443/encwbkiwnd. 2025/09/12 06:17:49 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:49 Increased send buffer size to 14336 kiB 2025/09/12 06:17:49 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:49 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:49 Created qlog file: /logs/qlog/68f1ab944db64fe1.sqlog 2025/09/12 06:17:49 client Starting new connection to server4 ([::]:36235 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 68f1ab944db64fe1, version v1 2025/09/12 06:17:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:49 client -> Sending packet 0 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 68f1ab944db64fe1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:49 client -> Sending packet 1 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: 68f1ab944db64fe1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1240, Data length: 271, Offset + Data length: 1511} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6a606e1f3e0ac87, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:49 client Received first packet. Switching destination connection ID to: f6a606e1f3e0ac87 2025/09/12 06:17:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104µs} 2025/09/12 06:17:49 client newly acked packets (1): [0] 2025/09/12 06:17:49 client updated RTT: 31.695623ms (σ: 15.847811ms) 2025/09/12 06:17:49 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:49 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:49 client -> Sending packet 2 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1240, Data length: 271, Offset + Data length: 1511} 2025/09/12 06:17:49 client -> Sending packet 3 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:49 client Long Header{Type: Initial, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 1240, Data length: 271, Offset + Data length: 1511} 2025/09/12 06:17:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:49 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/12 06:17:50 client -> Sending packet 4 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 1240, Data length: 271, Offset + Data length: 1511} 2025/09/12 06:17:50 client -> Sending packet 5 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 1240, Data length: 271, Offset + Data length: 1511} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:50 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6a606e1f3e0ac87, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client -> Sending packet 6 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client Queueing packet (102 bytes) for later decryption 2025/09/12 06:17:50 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6a606e1f3e0ac87, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1182, Version: v1} 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:50 client -> Sending packet 7 (1280 bytes) for connection 68f1ab944db64fe1, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client <- Reading packet 2 (764 bytes) for connection (empty), Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6a606e1f3e0ac87, PacketNumber: 2, PacketNumberLen: 1, Length: 747, Version: v1} 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/12 06:17:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 68f1ab944db64fe1, InitialSourceConnectionID: f6a606e1f3e0ac87, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0x5059c283f82ca8fa3614e4d911b85e91, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:50 client -> Sending packet 0 (82 bytes) for connection 68f1ab944db64fe1, Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: f6a606e1f3e0ac87, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:50 client Dropping Initial keys. 2025/09/12 06:17:50 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 57f10f696bd33bb7, StatelessResetToken: 0x60962c84e96f17e62a15feb9a83fe4be} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c1ba908bdf22c346, StatelessResetToken: 0x7868339d6dab767c3e38b76d2cecfa06} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a56e64f356fc588f, StatelessResetToken: 0xcb19bea73780d007cbc1d1a86e4c321d} 2025/09/12 06:17:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:50 client -> Sending packet 0 (59 bytes) for connection 68f1ab944db64fe1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 57f10f696bd33bb7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 601.474385ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:50 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bf78ffe3ffc43522, StatelessResetToken: 0x16f160265f3893981cf0492adb088fee} 2025/09/12 06:17:50 client Queuing ACK because there's a new missing packet to report. 2025/09/12 06:17:50 client -> Sending packet 1 (37 bytes) for connection 68f1ab944db64fe1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 57f10f696bd33bb7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 140.884µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:50 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:50 client -> Sending packet 2 (37 bytes) for connection 68f1ab944db64fe1, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 57f10f696bd33bb7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 221.279µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:50 client -> Sending packet 1 (69 bytes) for connection 68f1ab944db64fe1, Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 57f10f696bd33bb7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 22, Version: v1} 2025/09/12 06:17:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0xc, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:50 client Short Header{DestConnectionID: 57f10f696bd33bb7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:50 client Connection 68f1ab944db64fe1 closed. 2025/09/12 06:17:50 Requesting https://server4:443/nmzsdhcrow. 2025/09/12 06:17:50 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:50 Increased send buffer size to 14336 kiB 2025/09/12 06:17:50 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:50 Created qlog file: /logs/qlog/8fedf6e599db25b0.sqlog 2025/09/12 06:17:50 client Starting new connection to server4 ([::]:41317 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8fedf6e599db25b0, version v1 2025/09/12 06:17:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:50 client -> Sending packet 0 (1280 bytes) for connection 8fedf6e599db25b0, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 8fedf6e599db25b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:50 client -> Sending packet 1 (1280 bytes) for connection 8fedf6e599db25b0, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 8fedf6e599db25b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 1240, Data length: 269, Offset + Data length: 1509} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:50 client <- Reading packet 0 (40 bytes) for connection (empty), Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a2070ca57997bf5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 22, Version: v1} 2025/09/12 06:17:50 client Received first packet. Switching destination connection ID to: 4a2070ca57997bf5 2025/09/12 06:17:50 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112µs} 2025/09/12 06:17:50 client newly acked packets (1): [1] 2025/09/12 06:17:50 client updated RTT: 32.757173ms (σ: 16.378586ms) 2025/09/12 06:17:50 client setting loss timer for packet 0 (Initial) to 36.851819ms (in 2025-09-12 06:17:50.444016376 +0000 UTC m=+29.951126172) 2025/09/12 06:17:50 client Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 06:17:50.444016376 +0000 UTC m=+29.951126172 2025/09/12 06:17:50 client lost packet 0 (time threshold) 2025/09/12 06:17:50 client -> Sending packet 2 (1280 bytes) for connection 8fedf6e599db25b0, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 4a2070ca57997bf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:50 client -> Sending packet 3 (1280 bytes) for connection 8fedf6e599db25b0, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 4a2070ca57997bf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:50 client -> Sending packet 4 (1280 bytes) for connection 8fedf6e599db25b0, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 4a2070ca57997bf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:50 client Parsed a coalesced packet. Part 1: 136 bytes. Remaining: 1064 bytes. 2025/09/12 06:17:50 client <- Reading packet 1 (136 bytes) for connection (empty), Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a2070ca57997bf5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 118, Version: v1} 2025/09/12 06:17:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 424µs} 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Parsed a coalesced packet. Part 2: 1064 bytes. Remaining: 0 bytes. 2025/09/12 06:17:50 client <- Reading packet 0 (1064 bytes) for connection (empty), Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4a2070ca57997bf5, PacketNumber: 0, PacketNumberLen: 1, Length: 1047, Version: v1} 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/09/12 06:17:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8fedf6e599db25b0, InitialSourceConnectionID: 4a2070ca57997bf5, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xccb95c78ed0d7bff272f57eab4d50cca, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:50 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c6d61ef6d69280a, StatelessResetToken: 0x5c4f7fdb2cf20bcd1ef4256fea4c6f97} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: adfdc118a4645a3d, StatelessResetToken: 0xea2c6dc434e6f67fbb1422d07d4ba411} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e47000a85f08490c, StatelessResetToken: 0x8d97b5f6e7c44d2c6097abe938f6ef91} 2025/09/12 06:17:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8fedf6e599db25b0 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 4c6d61ef6d69280a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1140, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 4c6d61ef6d69280a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:50 client Short Header{DestConnectionID: 4c6d61ef6d69280a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:50 client Dropping Initial keys. 2025/09/12 06:17:50 client Dropping %!s(logging.PacketType=0) packet (42 bytes) because we already dropped the keys. 2025/09/12 06:17:50 client -> Sending packet 1 (43 bytes) for connection 8fedf6e599db25b0, Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 4c6d61ef6d69280a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client -> Sending packet 1 (36 bytes) for connection 8fedf6e599db25b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 4c6d61ef6d69280a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.099435ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 06:17:50 client -> Sending packet 2 (74 bytes) for connection 8fedf6e599db25b0, Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 4c6d61ef6d69280a, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:50 client -> Sending packet 3 (74 bytes) for connection 8fedf6e599db25b0, Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 4c6d61ef6d69280a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:50 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/09/12 06:17:50 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:50 client Dropping Handshake keys. 2025/09/12 06:17:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:50 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 06:17:50 client -> Sending packet 3 (56 bytes) for connection 8fedf6e599db25b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 4c6d61ef6d69280a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 90.049µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:50 client -> Sending packet 4 (48 bytes) for connection 8fedf6e599db25b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 4c6d61ef6d69280a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:50 client <- Reading packet 2 (26 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client <- Reading packet 3 (46 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f8ff30627cce4f3d, StatelessResetToken: 0x704d9eaa759dc6956558c54cc52e3e0a} 2025/09/12 06:17:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:50 client <- Reading packet 4 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:50 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:50 client -> Sending packet 5 (35 bytes) for connection 8fedf6e599db25b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 4c6d61ef6d69280a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 77.986µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client <- Reading packet 5 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:50 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:50 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:50 client -> Sending packet 6 (30 bytes) for connection 8fedf6e599db25b0, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 4c6d61ef6d69280a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:50 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:50 client Connection 8fedf6e599db25b0 closed. 2025/09/12 06:17:50 Requesting https://server4:443/fthyzspicd. 2025/09/12 06:17:50 Increased receive buffer size to 14336 kiB 2025/09/12 06:17:50 Increased send buffer size to 14336 kiB 2025/09/12 06:17:50 Setting DF for IPv4 and IPv6. 2025/09/12 06:17:50 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 06:17:50 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 06:17:50 Created qlog file: /logs/qlog/089ece7ffa711a4946.sqlog 2025/09/12 06:17:50 client Starting new connection to server4 ([::]:42101 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 089ece7ffa711a4946, version v1 2025/09/12 06:17:50 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 06:17:50 client -> Sending packet 0 (1280 bytes) for connection 089ece7ffa711a4946, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 089ece7ffa711a4946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:50 client -> Sending packet 1 (1280 bytes) for connection 089ece7ffa711a4946, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 089ece7ffa711a4946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:50 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 06:17:50 client -> Sending packet 2 (1280 bytes) for connection 089ece7ffa711a4946, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 089ece7ffa711a4946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 06:17:50 client -> Sending packet 3 (1280 bytes) for connection 089ece7ffa711a4946, Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 089ece7ffa711a4946, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 1239, Data length: 267, Offset + Data length: 1506} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 06:17:50 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/09/12 06:17:50 client <- Reading packet 1 (134 bytes) for connection (empty), Initial 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 44a69e1c1181cacf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 116, Version: v1} 2025/09/12 06:17:50 client Received first packet. Switching destination connection ID to: 44a69e1c1181cacf 2025/09/12 06:17:50 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 392µs} 2025/09/12 06:17:50 client newly acked packets (1): [2] 2025/09/12 06:17:50 client updated RTT: 33.142384ms (σ: 16.571192ms) 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 06:17:50 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/09/12 06:17:50 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 44a69e1c1181cacf, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/09/12 06:17:50 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/09/12 06:17:50 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 06:17:50 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 089ece7ffa711a4946, InitialSourceConnectionID: 44a69e1c1181cacf, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xf5aeaa2eee87888a79fde45c6f0819da, MaxDatagramFrameSize: 65535, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 06:17:50 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:50 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 499f017de03f0cef, StatelessResetToken: 0x3f350b4d3315a78827909d07025dbb7c} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97e76cbbe64df70f, StatelessResetToken: 0x7f3c1943ba0eec9a10aca8f62298c29f} 2025/09/12 06:17:50 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b83f81aebe436df, StatelessResetToken: 0xfd0a1777edbdda6cf096630a5456ac1b} 2025/09/12 06:17:50 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 06:17:50 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 089ece7ffa711a4946 2025/09/12 06:17:50 client Long Header{Type: Initial, DestConnectionID: 499f017de03f0cef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 499f017de03f0cef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 06:17:50 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 06:17:50 client Short Header{DestConnectionID: 499f017de03f0cef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 06:17:50 client Dropping Initial keys. 2025/09/12 06:17:50 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/09/12 06:17:50 client -> Sending packet 1 (43 bytes) for connection 089ece7ffa711a4946, Handshake 2025/09/12 06:17:50 client Long Header{Type: Handshake, DestConnectionID: 499f017de03f0cef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client -> Sending packet 1 (55 bytes) for connection 089ece7ffa711a4946, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:50 client Short Header{DestConnectionID: 499f017de03f0cef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:50 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 724.611µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:50 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 06:17:51 client <- Reading packet 1 (22 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:51 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:51 client <- &wire.HandshakeDoneFrame{} 2025/09/12 06:17:51 client Dropping Handshake keys. 2025/09/12 06:17:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:51 client <- Reading packet 2 (54 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:51 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:51 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 06:17:51 client newly acked packets (2): [0 1] 2025/09/12 06:17:51 client updated RTT: 32.96ms (σ: 12.791ms) 2025/09/12 06:17:51 client ECN capability confirmed. 2025/09/12 06:17:51 client Canceling loss detection timer. 2025/09/12 06:17:51 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a29f3e445ca99579, StatelessResetToken: 0xc69163f625fcc9821b84f372cf19cea9} 2025/09/12 06:17:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:51 client Ignoring all packets below 1. 2025/09/12 06:17:51 client -> Sending packet 2 (35 bytes) for connection 089ece7ffa711a4946, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:51 client Short Header{DestConnectionID: 499f017de03f0cef, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:51 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 119.886µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 06:17:51 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:51 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:51 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 06:17:51 client Setting ACK timer to max ack delay: 25ms 2025/09/12 06:17:51 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/09/12 06:17:51 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 06:17:51 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 06:17:51 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 06:17:51 client -> Sending packet 3 (35 bytes) for connection 089ece7ffa711a4946, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:51 client Short Header{DestConnectionID: 499f017de03f0cef, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:51 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 65.473µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 06:17:51 client Closing connection with error: Application error 0x0 (local) 2025/09/12 06:17:51 client -> Sending packet 4 (30 bytes) for connection 089ece7ffa711a4946, 1-RTT (ECN: ECT(0)) 2025/09/12 06:17:51 client Short Header{DestConnectionID: 499f017de03f0cef, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 06:17:51 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 06:17:51 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 06:17:51 client Connection 089ece7ffa711a4946 closed.