2025-04-30 13:18:35,637 Generated random file: dqejbgdqmh of size: 10240 2025-04-30 13:18:35,637 Requests: https://server4:443/dqejbgdqmh 2025-04-30 13:18:35,699 2025-04-30 13:18:35,700 Command: WAITFORSERVER=server:443 CERTS=/tmp/certs_fezhjijj/ TESTCASE_SERVER=retry TESTCASE_CLIENT=retry WWW=/tmp/www_55vz39_y/ DOWNLOADS=/tmp/download_ddphy8bf/ SERVER_LOGS=/tmp/logs_server_uuoalrtc CLIENT_LOGS=/tmp/logs_client__cucjp2z SCENARIO="simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25" CLIENT=peterdoornbosch/kwik_n_flupke-interop SERVER=ghcr.io/aws/s2n-quic/s2n-quic-qns:latest REQUESTS="https://server4:443/dqejbgdqmh" docker compose --env-file empty.env up --abort-on-container-exit --timeout 1 sim client server 2025-04-30 13:18:49,695 Container sim Created Container server Recreate Container client Recreate Container server Recreated Container client Recreated Attaching to client, server, sim sim | waiting 10s for server:443 client | Setting up routes... client | Actual changes: client | tx-checksum-ip-generic: off client | tx-tcp-segmentation: off [not requested] client | tx-tcp-ecn-segmentation: off [not requested] client | tx-tcp-mangleid-segmentation: off [not requested] client | tx-tcp6-segmentation: off [not requested] client | tx-udp-segmentation: off [not requested] client | tx-checksum-sctp: off client | Endpoint's IPv4 address is 193.167.0.100 client | Endpoint's IPv6 address is fd00:cafe:cafe::100 server | Setting up routes... server | Actual changes: server | tx-checksum-ip-generic: off server | tx-tcp-segmentation: off [not requested] server | tx-tcp-ecn-segmentation: off [not requested] server | tx-tcp-mangleid-segmentation: off [not requested] server | tx-tcp6-segmentation: off [not requested] server | tx-udp-segmentation: off [not requested] server | tx-checksum-sctp: off server | Endpoint's IPv4 address is 193.167.100.100 server | Endpoint's IPv6 address is fd00:cafe:cafe:100::100 server | x86_64 server | Server listening on port 443 client | Certificate was added to keystore client | wait-for-it.sh: waiting 30 seconds for sim:57832 sim | server:443 is available after 1.03412044s sim | Using scenario: simple-p2p --delay=15ms --bandwidth=10Mbps --queue=25 sim | tcpdump: listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes sim | tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes client | wait-for-it.sh: sim:57832 is available after 1 seconds client | 18:37.905 Creating connection with server4:443 with v1 client | 18:37.984 Original destination connection id: bb08755aa79866df (scid: 4fef001ec6fbaad6) client | >- CryptoStream[I|ClientHello] client | 18:38.102 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) client | 18:38.140 <- (1) Packet I|-|R|133| Retry Token (86): 6008bb08755aa79866df000000000000000000000000dff8b1cdec3d80a9a285ff2b84c2b6dcf57408f12072e28bb35880a3e8ab1781cdeab3a580b0fd86c251e43e4e9710f1886f5d84f7d7d010a998d633d9088be9 client | 18:38.164 -> Packet I|1|L|1201|2 Token=6008bb08755aa79866df000000000000000000000000dff8b1cdec3d80a9a285ff2b84c2b6dcf57408f12072e28bb35880a3e8ab1781cdeab3a580b0fd86c251e43e4e9710f1886f5d84f7d7d010a998d633d9088be9 CryptoFrame[0,257] Padding(802) client | 18:38.206 <- (2) Packet I|0|L|184|2 Token=[] AckFrame[1|?73] CryptoFrame[0,123] client | -< CryptoStream[I|ServerHello] client | 18:38.236 -> Packet I|2|L|1202|2 Token=6008bb08755aa79866df000000000000000000000000dff8b1cdec3d80a9a285ff2b84c2b6dcf57408f12072e28bb35880a3e8ab1781cdeab3a580b0fd86c251e43e4e9710f1886f5d84f7d7d010a998d633d9088be9 AckFrame[0|?0] Padding(1059) client | 18:38.206 <- (2) Packet H|0|L|1048|2 CryptoFrame[0,704] Padding(290) client | >- CryptoStream[H|Finished] client | -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] client | 18:38.266 -> Packet H|0|L|88|1 CryptoFrame[0,36] client | 18:38.267 -> Packet H|1|L|54|1 AckFrame[0|?0] client | 18:38.274 -> Packet A|0|S0|19a3219d02fd1f2329adf412b3272e54|55|1 StreamFrame[0(CIB),0,17,fin] client | 18:38.300 <- (3) Packet A|0|S0|4fef001ec6fbaad6|1452|2 PingFrame[] Padding(1425) client | 18:38.300 <- (4) Packet A|1|S0|4fef001ec6fbaad6|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|d92b6c36140906171143695146cd0f80|a2a18125a745a39d3e271235b3f5ad1f] NewConnectionIdFrame[2,<1|16d3e4ee713e95e1b6246d688f53a208|32560122c464074686bd19babcab0d17] client | 18:38.308 <- (5) Packet A|2|S0|4fef001ec6fbaad6|1232|3 AckFrame[0|?1] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1197] client | 18:38.313 -> Packet A|1|S0|d92b6c36140906171143695146cd0f80|42|2 AckFrame[1-0|?10] RetireConnectionIdFrame[0] client | 18:38.311 <- (6) Packet A|3|S0|4fef001ec6fbaad6|1232|2 HandshakeDoneFrame[] StreamFrame[0(CIB),1197,1201] client | 18:38.311 <- (7) Packet A|4|S0|4fef001ec6fbaad6|1232|2 HandshakeDoneFrame[] StreamFrame[0(CIB),2398,1201] client | 18:38.311 <- (8) Packet A|5|S0|4fef001ec6fbaad6|530|2 HandshakeDoneFrame[] StreamFrame[0(CIB),3599,497] client | 18:38.311 <- (9) Packet A|6|S0|4fef001ec6fbaad6|1232|2 HandshakeDoneFrame[] StreamFrame[0(CIB),4096,1201] client | 18:38.318 -> Packet A|2|S0|d92b6c36140906171143695146cd0f80|40|1 AckFrame[4-0|?2] client | 18:38.313 <- (10) Packet A|7|S0|4fef001ec6fbaad6|1232|2 HandshakeDoneFrame[] StreamFrame[0(CIB),5297,1201] client | 18:38.315 <- (11) Packet A|8|S0|4fef001ec6fbaad6|1232|2 HandshakeDoneFrame[] StreamFrame[0(CIB),6498,1201] client | 18:38.319 -> Packet A|3|S0|d92b6c36140906171143695146cd0f80|40|1 AckFrame[6-0|?1] client | 18:38.316 <- (12) Packet A|9|S0|4fef001ec6fbaad6|526|2 HandshakeDoneFrame[] StreamFrame[0(CIB),7699,493] client | 18:38.316 <- (13) Packet A|10|S0|4fef001ec6fbaad6|1232|2 HandshakeDoneFrame[] StreamFrame[0(CIB),8192,1201] client | 18:38.316 <- (14) Packet A|11|S0|4fef001ec6fbaad6|880|2 HandshakeDoneFrame[] StreamFrame[0(CIB),9393,847] client | 18:38.322 -> Packet A|4|S0|d92b6c36140906171143695146cd0f80|40|1 AckFrame[8-0|?1] client | 18:38.325 -> Packet A|5|S0|d92b6c36140906171143695146cd0f80|40|1 AckFrame[11-0|?1] client | 18:38.349 <- (15) Packet A|13|S0|4fef001ec6fbaad6|45|3 AckFrame[2-1|?0] StreamFrame[0(CIB),10240,0,fin] Padding(9) client | Get requested finished in 0.37 sec (0.03 MB/s) : tech.kwik.h09.client.HttpResponseImpl@2ddc8ecb client | 18:38.365 Closing ClientConnection[bb08755aa79866df/4fef001ec6fbaad6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) client | 18:38.368 -> Packet A|6|S0|d92b6c36140906171143695146cd0f80|46|2 ConnectionCloseFrame[0|0|] AckFrame[13,11-5|?16] client | Terminating Kwik client exited with code 0 Aborting on container exit... Container client Stopping Container server Stopping Container client Stopped Container server Stopped Container sim Stopping Container sim Stopped 2025-04-30 13:18:49,786 Using the server's key log file. 2025-04-30 13:18:49,795 2025-04-30 13:18:49,795 Using the server's key log file. 2025-04-30 13:18:49,795 Using the server's key log file. 2025-04-30 13:18:49,803 2025-04-30 13:18:49,804 Using the server's key log file. 2025-04-30 13:18:50,363 Check of downloaded files succeeded. 2025-04-30 13:18:50,932 Check of Retry succeeded. Token used: 6008bb08755aa79866df000000000000000000000000dff8b1cdec3d80a9a285ff2b84c2b6dcf57408f12072e28bb35880a3e8ab1781cdeab3a580b0fd86c251e43e4e9710f1886f5d84f7d7d010a998d633d9088be9