2025/04/30 13:29:40 Requesting https://server4:443/ocsyyovlxo. 2025/04/30 13:29:40 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:40 Increased send buffer size to 14336 kiB 2025/04/30 13:29:40 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:40 Created qlog file: /logs/qlog/a9977528d4d2371e10253b3c1d4ae6981bef12.sqlog 2025/04/30 13:29:40 client Starting new connection to server4 ([::]:38585 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9977528d4d2371e10253b3c1d4ae6981bef12, version v1 2025/04/30 13:29:40 Adding connection ID (empty). 2025/04/30 13:29:40 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:40 client -> Sending packet 0 (1280 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Initial 2025/04/30 13:29:40 client Long Header{Type: Initial, DestConnectionID: a9977528d4d2371e10253b3c1d4ae6981bef12, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:29:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:29:40 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1089 bytes. 2025/04/30 13:29:40 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:29:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:29:40 client Received first packet. Switching destination connection ID to: 34f05282bbaf1e0269dc5e419058f4ee 2025/04/30 13:29:40 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.896ms} 2025/04/30 13:29:40 client newly acked packets (1): [0] 2025/04/30 13:29:40 client updated RTT: 40.333935ms (σ: 20.166967ms) 2025/04/30 13:29:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:29:40 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:40 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:40 client Parsed a coalesced packet. Part 2: 1089 bytes. Remaining: 0 bytes. 2025/04/30 13:29:40 client <- Reading packet 0 (1089 bytes) for connection (empty), Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 0, PacketNumberLen: 1, Length: 1064, Version: v1} 2025/04/30 13:29:40 client <- &wire.CryptoFrame{Offset: 0, Data length: 1043, Offset + Data length: 1043} 2025/04/30 13:29:40 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9977528d4d2371e10253b3c1d4ae6981bef12, InitialSourceConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:29:40 client -> Sending packet 1 (1280 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Initial 2025/04/30 13:29:40 client Long Header{Type: Initial, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:40 client -> Sending packet 0 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:40 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:40 client Dropping Initial keys. 2025/04/30 13:29:40 client <- Reading packet 1 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 1, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:40 client <- &wire.CryptoFrame{Offset: 1043, Data length: 1185, Offset + Data length: 2228} 2025/04/30 13:29:40 client -> Sending packet 1 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:40 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:29:40 client <- Reading packet 2 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 2, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:40 client <- &wire.CryptoFrame{Offset: 2228, Data length: 1185, Offset + Data length: 3413} 2025/04/30 13:29:40 client -> Sending packet 2 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:40 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:40 client <- Reading packet 3 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 3, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:40 client <- &wire.CryptoFrame{Offset: 3413, Data length: 1185, Offset + Data length: 4598} 2025/04/30 13:29:40 client -> Sending packet 3 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:40 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:29:40 client -> Sending packet 4 (45 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:40 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 13:29:40 client -> &wire.PingFrame{} 2025/04/30 13:29:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:29:41 client -> Sending packet 5 (45 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 13:29:41 client -> &wire.PingFrame{} 2025/04/30 13:29:41 client -> Sending packet 6 (45 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 20, Version: v1} 2025/04/30 13:29:41 client -> &wire.PingFrame{} 2025/04/30 13:29:41 client <- Reading packet 4 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 4, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:41 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 4.28ms} 2025/04/30 13:29:41 client Peer doesn't await address validation any longer. 2025/04/30 13:29:41 client newly acked packets (1): [6] 2025/04/30 13:29:41 client updated RTT: 39.459ms (σ: 16.871ms) 2025/04/30 13:29:41 client Canceling loss detection timer. 2025/04/30 13:29:41 client <- &wire.CryptoFrame{Offset: 4598, Data length: 1179, Offset + Data length: 5777} 2025/04/30 13:29:41 client -> Sending packet 7 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 5 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 5, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:41 client <- &wire.CryptoFrame{Offset: 5777, Data length: 1185, Offset + Data length: 6962} 2025/04/30 13:29:41 client -> Sending packet 8 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 6 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 6, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:41 client <- &wire.CryptoFrame{Offset: 6962, Data length: 1185, Offset + Data length: 8147} 2025/04/30 13:29:41 client -> Sending packet 9 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 7 (1232 bytes) for connection (empty), Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 7, PacketNumberLen: 1, Length: 1207, Version: v1} 2025/04/30 13:29:41 client <- &wire.CryptoFrame{Offset: 8147, Data length: 1185, Offset + Data length: 9332} 2025/04/30 13:29:41 client -> Sending packet 10 (51 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 8 (658 bytes) for connection (empty), Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 8, PacketNumberLen: 1, Length: 633, Version: v1} 2025/04/30 13:29:41 client <- &wire.CryptoFrame{Offset: 9332, Data length: 611, Offset + Data length: 9943} 2025/04/30 13:29:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:41 client -> Sending packet 11 (90 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, Handshake 2025/04/30 13:29:41 client Long Header{Type: Handshake, DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:41 client -> Sending packet 0 (54 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:41 client Short Header{DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:41 client <- Reading packet 0 (1452 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.PingFrame{} 2025/04/30 13:29:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:29:41 client -> Sending packet 1 (43 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:41 client Short Header{DestConnectionID: 34f05282bbaf1e0269dc5e419058f4ee, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 73.508µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 1 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:41 client Dropping Handshake keys. 2025/04/30 13:29:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: a9b2deccd795e6b38bd56fd29f07c3dd, StatelessResetToken: 0xf86396524185af7b8b81a812e0be8040} 2025/04/30 13:29:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 22034a4d7f33c4cdd459ae7babc9fd85, StatelessResetToken: 0x2a7c679c8823838638a8bbc32f92d9fe} 2025/04/30 13:29:41 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 3b9c371e8eaa6b304c018d8a690ff43a, StatelessResetToken: 0x1cc314f08bcdf6537c30fd4cd6462c98} 2025/04/30 13:29:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:41 client -> Sending packet 2 (45 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:41 client Short Header{DestConnectionID: a9b2deccd795e6b38bd56fd29f07c3dd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 87.25µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:41 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 936µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client newly acked packets (1): [0] 2025/04/30 13:29:41 client updated RTT: 38.699ms (σ: 14.172ms) 2025/04/30 13:29:41 client ECN capability confirmed. 2025/04/30 13:29:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1202, Offset + Data length: 1202} 2025/04/30 13:29:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:41 client <- Reading packet 3 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1202, Data length: 1209, Offset + Data length: 2411} 2025/04/30 13:29:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:29:41 client -> Sending packet 3 (43 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:41 client Short Header{DestConnectionID: a9b2deccd795e6b38bd56fd29f07c3dd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 60.012µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 4 (1232 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2411, Data length: 1209, Offset + Data length: 3620} 2025/04/30 13:29:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:41 client <- Reading packet 5 (501 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3620, Data length: 476, Offset + Data length: 4096} 2025/04/30 13:29:41 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:29:41 client -> Sending packet 4 (43 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:41 client Short Header{DestConnectionID: a9b2deccd795e6b38bd56fd29f07c3dd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 49.513µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:29:41 client <- Reading packet 6 (1049 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:41 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 4096, Data length: 1024, Offset + Data length: 5120} 2025/04/30 13:29:41 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:29:41 client -> Sending packet 5 (38 bytes) for connection a9977528d4d2371e10253b3c1d4ae6981bef12, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:41 client Short Header{DestConnectionID: a9b2deccd795e6b38bd56fd29f07c3dd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:29:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:29:41 client Connection a9977528d4d2371e10253b3c1d4ae6981bef12 closed.