2025/04/30 12:14:16 Requesting https://server4:443/ajvrjsprpw. 2025/04/30 12:14:16 Increased receive buffer size to 14336 kiB 2025/04/30 12:14:16 Increased send buffer size to 14336 kiB 2025/04/30 12:14:16 Setting DF for IPv4 and IPv6. 2025/04/30 12:14:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:14:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:14:16 Created qlog file: /logs/qlog/d608103461425d340cfa.sqlog 2025/04/30 12:14:16 client Starting new connection to server4 ([::]:39201 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d608103461425d340cfa, version v1 2025/04/30 12:14:16 Adding connection ID (empty). 2025/04/30 12:14:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 12:14:16 client -> Sending packet 0 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:16 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:14:17 client -> Sending packet 1 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:17 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:17 client -> Sending packet 2 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:17 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 12:14:17 client -> Sending packet 3 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:17 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:17 client -> Sending packet 4 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:17 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 12:14:18 client -> Sending packet 5 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:18 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:18 client -> Sending packet 6 (1280 bytes) for connection d608103461425d340cfa, Initial 2025/04/30 12:14:18 client Long Header{Type: Initial, DestConnectionID: d608103461425d340cfa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 12:14:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 12:14:18 client Parsed a coalesced packet. Part 1: 134 bytes. Remaining: 1066 bytes. 2025/04/30 12:14:18 client <- Reading packet 0 (134 bytes) for connection (empty), Initial 2025/04/30 12:14:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f032a36efb23b6c8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 116, Version: v1} 2025/04/30 12:14:18 client Received first packet. Switching destination connection ID to: f032a36efb23b6c8 2025/04/30 12:14:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/04/30 12:14:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:14:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:14:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:14:18 client Parsed a coalesced packet. Part 2: 1066 bytes. Remaining: 0 bytes. 2025/04/30 12:14:18 client <- Reading packet 0 (1066 bytes) for connection (empty), Handshake 2025/04/30 12:14:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f032a36efb23b6c8, PacketNumber: 0, PacketNumberLen: 1, Length: 1049, Version: v1} 2025/04/30 12:14:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:14:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:14:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:14:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d608103461425d340cfa, InitialSourceConnectionID: f032a36efb23b6c8, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, StatelessResetToken: 0xdec2e80bc771cee720aa8da26336aa86, MaxDatagramFrameSize: 65535} 2025/04/30 12:14:18 client <- Reading packet 0 (102 bytes) for connection (empty), 1-RTT 2025/04/30 12:14:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:14:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 20c1c73d2a874e1f, StatelessResetToken: 0x43370412752335394182a12e54cdd355} 2025/04/30 12:14:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8e0842e7b57d647, StatelessResetToken: 0x463d42092ec590670ef29d04570e23d1} 2025/04/30 12:14:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2aa9b9febcf2c6a5, StatelessResetToken: 0xb72b392cd1bfd3aef280308a86dbbbef} 2025/04/30 12:14:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:14:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d608103461425d340cfa 2025/04/30 12:14:18 client Long Header{Type: Initial, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1159, Version: v1} 2025/04/30 12:14:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:14:18 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:18 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:14:18 client Dropping Initial keys. 2025/04/30 12:14:18 client -> Sending packet 1 (89 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:18 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:14:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:14:18 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:14:18 client -> Sending packet 2 (36 bytes) for connection d608103461425d340cfa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:14:18 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 971.099µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:14:18 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:14:18 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:14:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:14:18 client -> Sending packet 2 (74 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:18 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:18 client -> Sending packet 3 (74 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:18 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:18 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:14:18 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:14:18 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 12:14:19 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:14:19 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:14:19 client <- Reading packet 1 (766 bytes) for connection (empty), Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f032a36efb23b6c8, PacketNumber: 1, PacketNumberLen: 1, Length: 749, Version: v1} 2025/04/30 12:14:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:14:19 client -> Sending packet 4 (43 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:14:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 12:14:19 client <- Reading packet 2 (766 bytes) for connection (empty), Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f032a36efb23b6c8, PacketNumber: 2, PacketNumberLen: 1, Length: 749, Version: v1} 2025/04/30 12:14:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 728, Offset + Data length: 728} 2025/04/30 12:14:19 client -> Sending packet 5 (43 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 12:14:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:14:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:14:19 client -> Sending packet 6 (74 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:19 client -> Sending packet 7 (74 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:19 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:14:19 client Dropping %!s(logging.PacketType=0) packet (40 bytes) because we already dropped the keys. 2025/04/30 12:14:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 12:14:19 client -> Sending packet 8 (74 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:19 client -> Sending packet 9 (74 bytes) for connection d608103461425d340cfa, Handshake 2025/04/30 12:14:19 client Long Header{Type: Handshake, DestConnectionID: 20c1c73d2a874e1f, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 12:14:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:14:19 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:14:19 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 12:14:19 client <- Reading packet 1 (27 bytes) for connection (empty), 1-RTT 2025/04/30 12:14:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:14:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 12:14:19 client Dropping Handshake keys. 2025/04/30 12:14:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 12:14:19 client newly acked packets (2): [0 1] 2025/04/30 12:14:19 client Canceling loss detection timer. 2025/04/30 12:14:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:14:19 client <- Reading packet 2 (46 bytes) for connection (empty), 1-RTT 2025/04/30 12:14:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:14:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6d1c751ed52568a8, StatelessResetToken: 0x39d99cdd8c89cb10e97d474f178d1d78} 2025/04/30 12:14:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:14:19 client -> Sending packet 3 (1366 bytes) for connection d608103461425d340cfa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:14:19 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:19 client -> &wire.PingFrame{} 2025/04/30 12:14:19 client -> Sending packet 4 (35 bytes) for connection d608103461425d340cfa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:14:19 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 144.531µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 12:14:19 client <- Reading packet 3 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 12:14:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:14:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:14:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 12:14:19 client <- Reading packet 4 (23 bytes) for connection (empty), 1-RTT 2025/04/30 12:14:19 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:14:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 12:14:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 12:14:19 client -> Sending packet 5 (35 bytes) for connection d608103461425d340cfa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:14:19 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:19 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 78.357µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 12:14:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 12:14:19 client -> Sending packet 6 (30 bytes) for connection d608103461425d340cfa, 1-RTT (ECN: ECT(0)) 2025/04/30 12:14:19 client Short Header{DestConnectionID: 20c1c73d2a874e1f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:14:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:14:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 12:14:19 client Connection d608103461425d340cfa closed.